Skip to content

feat(encryption) [1/N] Support encryption: Add crypto for AES-GCM#2026

Merged
blackmwk merged 13 commits intoapache:mainfrom
xanderbailey:xb/core_encryption
Mar 25, 2026
Merged

feat(encryption) [1/N] Support encryption: Add crypto for AES-GCM#2026
blackmwk merged 13 commits intoapache:mainfrom
xanderbailey:xb/core_encryption

Conversation

@xanderbailey
Copy link
Copy Markdown
Contributor

@xanderbailey xanderbailey commented Jan 14, 2026

Add Core Encryption Primitives for Iceberg Encryption Support.

Part of #2034

Summary

This PR introduces the foundational cryptographic primitives needed for implementing encryption in iceberg-rust, providing AES-GCM encryption operations that match the Java implementation's behavior and data format.

Motivation

Iceberg's Java implementation supports table-level encryption to protect sensitive data at rest. To achieve feature parity and ensure interoperability between Java and Rust implementations, we need to build encryption support from the ground up. This PR provides the core cryptographic operations that will serve as the foundation for the complete encryption feature.

Changes

New Module: encryption

Added a new encryption module with core AES-GCM cryptographic operations:

  • encryption/crypto.rs - Core encryption implementation
    • EncryptionAlgorithm enum supporting AES-128-GCM as this is the only algorithm currently supported in arrow parquet
    • SecureKey struct with automatic memory zeroization for security
    • AesGcmEncryptor providing encrypt/decrypt operations with AAD support

Key Features

  1. Java-Compatible Format: Ciphertext format matches Java's implementation exactly:
    [12-byte nonce][encrypted data][16-byte GCM authentication tag]
  2. This ensures files encrypted by Java can be decrypted by Rust and vice versa.
  3. Secure Key Handling: Uses the zeroize crate to automatically clear encryption keys from memory when dropped, preventing key material from lingering in memory.
  4. Additional Authenticated Data (AAD): Full support for AAD to ensure integrity of associated metadata that isn't encrypted.
  5. Comprehensive Testing: 8 tests covering:
    - Round-trip encryption/decryption for both AES-128 and AES-256
    - AAD validation
    - Empty plaintext handling
    - Tamper detection
    - Format compatibility verification

Dependencies Added

  • aes-gcm = "0.10" - Industry-standard AES-GCM implementation
  • zeroize = "1.7" - Secure memory cleanup for encryption keys

Compatibility

This implementation directly corresponds to Java's https://github.com/apache/iceberg/blob/main/core/src/main/java/org/apache/iceberg/encryption/Ciphers.java:

Java Class Rust Implementation
Ciphers.AesGcmEncryptor AesGcmEncryptor::encrypt()
Ciphers.AesGcmDecryptor AesGcmEncryptor::decrypt()
EncryptionAlgorithm.AES_GCM EncryptionAlgorithm::Aes128Gcm

Testing

Future Work

This PR is the first in a series to implement full encryption support. Upcoming PRs will add:

  1. Table properties for encryption configuration
  2. Key management interfaces (KeyManagementClient trait)
  3. EncryptionManager implementation
  4. Native Parquet encryption integration
  5. AWS KMS support
  6. Integration with Table and FileIO

Review Notes

  • This PR is intentionally minimal and self-contained
  • No existing code paths are modified - this is purely additive
  • The module is public but won't be used until future PRs wire it up
  • Format compatibility with Java has been prioritized to ensure interoperability

Which issue does this PR close?

What changes are included in this PR?

Are these changes tested?

Yes

@xanderbailey xanderbailey force-pushed the xb/core_encryption branch 5 times, most recently from c5299d9 to d9e4e2f Compare January 14, 2026 17:58
@xanderbailey xanderbailey changed the title Add crypto for AES-GCM [1/N] Support encryption: Add crypto for AES-GCM Jan 14, 2026
@mbutrovich mbutrovich self-requested a review January 14, 2026 20:26
@mbutrovich
Copy link
Copy Markdown
Collaborator

This is awesome! I will take a look since I did a lot of the PME support in Comet. Regarding AES-256-GCM support, last I looked Arrow-rs' Parquet reader only supported 128. Is that not the case anymore?

@xanderbailey
Copy link
Copy Markdown
Contributor Author

You are correct by the looks of it! https://github.com/apache/arrow-rs/blob/main/parquet/src/encryption/ciphers.rs

@xanderbailey xanderbailey changed the title [1/N] Support encryption: Add crypto for AES-GCM feat(encryption) [1/N] Support encryption: Add crypto for AES-GCM Jan 15, 2026
@hsiang-c
Copy link
Copy Markdown

hsiang-c commented Jan 16, 2026

@xanderbailey Thank you for the great work on encryption support!

Regarding arror-rs, I removed the hardcoded AES-128 constraint w/ apache/arrow-rs#9203, hope that helps a bit. Because we're using PME with AES-256

cc @mbutrovich

@xanderbailey
Copy link
Copy Markdown
Contributor Author

This helps a bunch thanks!

@xanderbailey
Copy link
Copy Markdown
Contributor Author

@mbutrovich are you still okay to review this? Keen to start getting stuff merged!

Copy link
Copy Markdown
Collaborator

@mbutrovich mbutrovich left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This foundation looks solid to me. We'll need a committer to approve, but based on previous Parquet Modular Encryption work this is off to a good start. Thank you for driving this work, @xanderbailey!

Comment thread crates/iceberg/src/encryption/crypto.rs Outdated
#[derive(Debug, Clone, Copy, PartialEq, Eq)]
pub enum EncryptionAlgorithm {
/// AES-128 in GCM mode
Aes128Gcm,
Copy link
Copy Markdown
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We're trying to get 256 added to Arrow-rs, this approach should work with that?

Copy link
Copy Markdown
Contributor Author

@xanderbailey xanderbailey Feb 17, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Correct, the crate has both! Designed to be extended once the arrow PR merges

Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

once the arrow PR merges

Not a huge deal, but I wonder whether you can save a bit of extra review churn by filling that part in already and having the pre-existing FeatureUnsupported error in this PR?

/// Iceberg feature is not supported.
///
/// This error is returned when given iceberg feature is not supported.
FeatureUnsupported,

As I say, this is also probably quite easy to do in a follow-up too once it does merge. So not a huge deal 👍

Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Do we really need this enum? I think iceberg currently only support AES_GCM, and the enum is actully not used anyware.

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We will support 256 bit as soon is we get support in the parquet reader / writer so I wanted to trivially be able to extend this.

Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Could we remove this enum for now? I checked java's source code and only find one corresponding enum: https://github.com/apache/iceberg/blob/bec6793af822cb791fa5975b41b8936631556c46/core/src/main/java/org/apache/iceberg/encryption/NativeFileCryptoParameters.java#L32

It's already marked as deprecated. I'm not sure if we actually need this enum.

Copy link
Copy Markdown
Collaborator

@mbutrovich mbutrovich Mar 18, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Iceberg spec defers data file encryption for Parquet to its spec, which supports 128, 192, and 256 bit.

https://parquet.apache.org/docs/file-format/data-pages/encryption/

Iceberg metadata files can use AES GCM 128, 192, and 256 bit.

https://iceberg.apache.org/gcm-stream-spec/#goals

We should keep the enum, or expect to add something similar back in the future (maybe in the encryption RFC?). It seems like we should anticipate a possible API break in the future and have the enum now.

Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm still quite confused because I don't see the usage of EncryptionAlgorithm in java. If we have to add this, I'm thinking sth as following:

pub enum AesKeySize {
   Bits128  = 128,
   Bits192  = 192,
   Bits256 = 256
}

And this could be used in following.

Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Please correct me if I'm wrong, and point a source where it's used in java codebase.

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It's not used in java but java's Cipher class can handle just the length because the underlying library is happy to accept a key length which is not true for us so we need to dispatch somewhere, I guess my design had this dispatch on creation but your suggestion is to do it at encrypt / decrypt time which is totally fine also. Happy to make this change. Thanks for iterating with me.

Comment thread crates/iceberg/src/encryption/crypto.rs Outdated
/// Returns the key length in bytes for this algorithm.
pub fn key_length(&self) -> usize {
match self {
Self::Aes128Gcm => <Aes128Gcm as KeySizeUser>::KeySize::USIZE,
Copy link
Copy Markdown
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Same question about 256 for these following functions.

Comment thread crates/iceberg/src/encryption/crypto.rs Outdated

/// A secure encryption key that zeroes its memory on drop.
pub struct SecureKey {
key: Zeroizing<Vec<u8>>,
Copy link
Copy Markdown
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Good, clears it.

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Tried to follow best practices here

@xanderbailey
Copy link
Copy Markdown
Contributor Author

Thanks for the review! I'm new to contributing to iceberg, what's the convention for getting a committer to review?

@mbutrovich
Copy link
Copy Markdown
Collaborator

mbutrovich commented Feb 18, 2026

Thanks for the review! I'm new to contributing to iceberg, what's the convention for getting a committer to review?

We need an Iceberg committer, most likely one of the folks working more closely on the Iceberg-rust repo (@Xuanwo and @blackmwk). However, with Lunar New Year I think they'll be slow to respond for a little bit.

@mbutrovich
Copy link
Copy Markdown
Collaborator

I think is ready for review from a committer @Xuanwo @blackmwk. @xanderbailey has a number of PRs queued up to get encryption support going in iceberg-rust.

@blackmwk
Copy link
Copy Markdown
Contributor

Thanks @xanderbailey and @mbutrovich for this pr, I'll take a look recently.

@blackmwk
Copy link
Copy Markdown
Contributor

Hi, @xanderbailey Iceberg's encryption support is relative large piece. Would you mind to write an rfc to describe the overall design and the split them into small prs to do it? Here is a good example of this process: #1885

@xanderbailey
Copy link
Copy Markdown
Contributor Author

Happy to write an RFC. Will work on that today.

@xanderbailey
Copy link
Copy Markdown
Contributor Author

RFC: #2183

Copy link
Copy Markdown
Contributor

@jdockerty jdockerty left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This looks really nice and it is easy to follow. Great stuff, it is definitely ready for maintainer review 👍

I see there was an ask on writing up an RFC too. I think it is worth including that RFC link either directly in this PR's description and/or in the encryption/mod.rs so that it is easy to discover for someone browsing around trying to understand the design decisions.

Comment thread crates/iceberg/src/encryption/crypto.rs Outdated
/// containing `SensitiveBytes` can safely derive or implement `Debug`
/// without risk of leaking key material.
#[derive(Clone, PartialEq, Eq)]
pub struct SensitiveBytes(Zeroizing<Box<[u8]>>);
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Love this 💯

Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

+1

Comment thread crates/iceberg/src/encryption/crypto.rs Outdated
#[derive(Debug, Clone, Copy, PartialEq, Eq)]
pub enum EncryptionAlgorithm {
/// AES-128 in GCM mode
Aes128Gcm,
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

once the arrow PR merges

Not a huge deal, but I wonder whether you can save a bit of extra review churn by filling that part in already and having the pre-existing FeatureUnsupported error in this PR?

/// Iceberg feature is not supported.
///
/// This error is returned when given iceberg feature is not supported.
FeatureUnsupported,

As I say, this is also probably quite easy to do in a follow-up too once it does merge. So not a huge deal 👍

Comment thread crates/iceberg/src/encryption/crypto.rs Outdated
Comment on lines +125 to +126
ErrorKind::DataInvalid,
format!("Unsupported encryption algorithm: {s}"),
Copy link
Copy Markdown
Contributor

@jdockerty jdockerty Mar 8, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This might be better mapped to the FeatureUnsupported error, considering the message is also about an unsupported algorithm. Rather than invalid data (although I do think DataInvalid works anyway)

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yeah I wasn't sure about this one, it could be an algorithm unsupported by the spec or an algorithm unsupported by iceberg-rs and I wasn't sure how to distinguish these.

@xanderbailey
Copy link
Copy Markdown
Contributor Author

@blackmwk how would you feel about starting to get some parts of the implementation merged whilst we work out some final details of the RFC?

@blackmwk
Copy link
Copy Markdown
Contributor

@blackmwk how would you feel about starting to get some parts of the implementation merged whilst we work out some final details of the RFC?

Hi, @xanderbailey Yeah, we could move on with small part that we reached consensus.

blackmwk
blackmwk previously approved these changes Mar 13, 2026
Copy link
Copy Markdown
Contributor

@blackmwk blackmwk left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks @xanderbailey for this pr, left some comments and questions. I have to admit that I'm not an expert in encryption, so hopefully you could resolve my questions.

Comment thread crates/iceberg/src/encryption/crypto.rs Outdated
/// containing `SensitiveBytes` can safely derive or implement `Debug`
/// without risk of leaking key material.
#[derive(Clone, PartialEq, Eq)]
pub struct SensitiveBytes(Zeroizing<Box<[u8]>>);
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

+1

Comment thread crates/iceberg/src/encryption/crypto.rs Outdated
#[derive(Debug, Clone, Copy, PartialEq, Eq)]
pub enum EncryptionAlgorithm {
/// AES-128 in GCM mode
Aes128Gcm,
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Do we really need this enum? I think iceberg currently only support AES_GCM, and the enum is actully not used anyware.

Comment thread crates/iceberg/src/encryption/crypto.rs Outdated
///
/// The cipher is initialized once at construction time.
pub struct AesGcmEncryptor {
cipher: CipherImpl,
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It's a little odd. It's called AesGcmEncryptor, but it has enum for support inside. I checked java's code, and I think currently iceberg only support AesGcm? I'm thinking we only need need a struct
AesGcmCipher, which could be used for do encryption/decrpytion.

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yes, the additional option is to use 256 which is still AES-GCM but different length keys.

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I can add this once apache/arrow-rs#9203 has merged and we bump arrow.

Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

What I want to say is that other encryption algorithms (e.g. aes gcm 256) are format specific, and currently in iceberg itself, we only need to keep AesGcmEncryptor. The support for format specific algorithm should be in format specific module like arrow.
In my opinion, in this pr we only need to keep AesGcmEncryptor, and remove other components.

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The algorithm selection isn't just for Parquet data files - it's also needed for encrypting metadata files (manifests, manifest lists) at the core Iceberg layer, which never goes through the arrow/format module. The encryption.data-key-length table property controls DEK generation for all encrypted files uniformly, so the core crate needs to know whether it's 128 or 256.

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sorry if I have misunderstood your point here!

Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I still don't quite understand? Will there be huge difference for different key length? Will not such thing be more concise?

pub struct AesGcmEncryptor {
  /// From table property
   key_length: usize
}

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The aes_gcm crate uses distinct types for Aes128Gcm and Aes256Gcm - they're different generic instantiations, not runtime-configurable. A key_length: usize field can't select between them at the type level, so we'd still need branching logic somewhere. The CipherImpl enum resolves this dispatch once at construction time rather than on every encrypt/decrypt call which seems more idiomatic to me?

Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sorry, I'm not quite convinced, in aes_gcm both and Aes128Gsm and Aes256Gsm are just type aliases. With the enum in https://github.com/apache/iceberg-rust/pull/2026/changes#r2957736592, we could do following:

match AesKeySize {
  Bit128 => encrypt<Aes, Nounce128>(...)
Bit256 => encrypt<Aes, Nounce256>(...)
}
fn encrypt<Aes, NouunceSize> (...) {
    ...
}

@xanderbailey xanderbailey force-pushed the xb/core_encryption branch 2 times, most recently from 29db563 to 169dc22 Compare March 16, 2026 10:06
Comment thread crates/iceberg/src/encryption/crypto.rs
Comment thread crates/iceberg/src/encryption/crypto.rs Outdated
#[derive(Debug, Clone, Copy, PartialEq, Eq)]
pub enum EncryptionAlgorithm {
/// AES-128 in GCM mode
Aes128Gcm,
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Could we remove this enum for now? I checked java's source code and only find one corresponding enum: https://github.com/apache/iceberg/blob/bec6793af822cb791fa5975b41b8936631556c46/core/src/main/java/org/apache/iceberg/encryption/NativeFileCryptoParameters.java#L32

It's already marked as deprecated. I'm not sure if we actually need this enum.

Comment thread crates/iceberg/src/encryption/crypto.rs Outdated
///
/// The cipher is initialized once at construction time.
pub struct AesGcmEncryptor {
cipher: CipherImpl,
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I still don't quite understand? Will there be huge difference for different key length? Will not such thing be more concise?

pub struct AesGcmEncryptor {
  /// From table property
   key_length: usize
}

Comment thread crates/iceberg/src/encryption/crypto.rs Outdated
/// AES-GCM encryptor for encrypting and decrypting data.
///
/// The cipher is initialized once at construction time.
pub struct AesGcmEncryptor {
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
pub struct AesGcmEncryptor {
pub struct AesGcmCipher {

@blackmwk blackmwk dismissed their stale review March 18, 2026 03:27

Approved by mistake.

@xanderbailey
Copy link
Copy Markdown
Contributor Author

The aes_gcm crate uses distinct types for Aes128Gcm and Aes256Gcm - they're different generic instantiations, not runtime-configurable. A key_length: usize field can't select between them at the type level, so we'd still need branching logic somewhere. The CipherImpl enum resolves this dispatch once at construction time rather than on every encrypt/decrypt call which seems more idiomatic to me?

Copy link
Copy Markdown
Contributor

@blackmwk blackmwk left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks @xanderbailey for this pr! Generally LGTM, just several minor suggestions.

Comment thread crates/iceberg/src/encryption/crypto.rs Outdated
Comment thread crates/iceberg/src/encryption/crypto.rs Outdated
/// containing `SensitiveBytes` can safely derive or implement `Debug`
/// without risk of leaking key material.
#[derive(Clone, PartialEq, Eq)]
pub struct SensitiveBytes(Zeroizing<Box<[u8]>>);
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
pub struct SensitiveBytes(Zeroizing<Box<[u8]>>);
struct SensitiveBytes(Zeroizing<Box<[u8]>>);

I think we are expecting to expose SecureKey as public api, and we should hide this?

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Copy link
Copy Markdown
Contributor

@blackmwk blackmwk left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks @xanderbailey for this pr!

@blackmwk blackmwk merged commit fea5906 into apache:main Mar 25, 2026
20 checks passed
toutane pushed a commit to DataDog/iceberg-rust that referenced this pull request Apr 23, 2026
…ache#2026)

Add Core Encryption Primitives for Iceberg Encryption Support.

Part of apache#2034

## Summary

This PR introduces the foundational cryptographic primitives needed for
implementing encryption in iceberg-rust, providing AES-GCM encryption
operations that match the Java implementation's behavior and data
format.

 ## Motivation

Iceberg's Java implementation supports table-level encryption to protect
sensitive data at rest. To achieve feature parity and ensure
interoperability between Java and Rust implementations, we need to build
encryption support from the ground up. This PR provides the core
cryptographic operations that will serve as the foundation for the
complete encryption feature.

 ## Changes

  New Module: encryption

Added a new encryption module with core AES-GCM cryptographic
operations:

  - encryption/crypto.rs - Core encryption implementation
- EncryptionAlgorithm enum supporting AES-128-GCM as this is the only
algorithm currently supported in arrow parquet
    - SecureKey struct with automatic memory zeroization for security
- AesGcmEncryptor providing encrypt/decrypt operations with AAD support

  Key Features

1. Java-Compatible Format: Ciphertext format matches Java's
implementation exactly:
  [12-byte nonce][encrypted data][16-byte GCM authentication tag]
1. This ensures files encrypted by Java can be decrypted by Rust and
vice versa.
2. Secure Key Handling: Uses the zeroize crate to automatically clear
encryption keys from memory when dropped, preventing key material from
lingering in memory.
3. Additional Authenticated Data (AAD): Full support for AAD to ensure
integrity of associated metadata that isn't encrypted.
  4. Comprehensive Testing: 8 tests covering:
    - Round-trip encryption/decryption for both AES-128 and AES-256
    - AAD validation
    - Empty plaintext handling
    - Tamper detection
    - Format compatibility verification

  Dependencies Added

  - aes-gcm = "0.10" - Industry-standard AES-GCM implementation
  - zeroize = "1.7" - Secure memory cleanup for encryption keys

  Compatibility

This implementation directly corresponds to Java's
https://github.com/apache/iceberg/blob/main/core/src/main/java/org/apache/iceberg/encryption/Ciphers.java:

| Java Class | Rust Implementation |

|-----------------------------|------------------------------------------|
| Ciphers.AesGcmEncryptor | AesGcmEncryptor::encrypt() |
| Ciphers.AesGcmDecryptor | AesGcmEncryptor::decrypt() |
  | EncryptionAlgorithm.AES_GCM | EncryptionAlgorithm::Aes128Gcm|

  Testing

  Future Work

This PR is the first in a series to implement full encryption support.
Upcoming PRs will add:

  1. Table properties for encryption configuration
  2. Key management interfaces (KeyManagementClient trait)
  3. EncryptionManager implementation
  4. Native Parquet encryption integration
  5. AWS KMS support
  6. Integration with Table and FileIO

  Review Notes

  - This PR is intentionally minimal and self-contained
  - No existing code paths are modified - this is purely additive
  - The module is public but won't be used until future PRs wire it up
- Format compatibility with Java has been prioritized to ensure
interoperability

## Which issue does this PR close?

<!--
We generally require a GitHub issue to be filed for all bug fixes and
enhancements and this helps us generate change logs for our releases.
You can link an issue to this PR using the GitHub syntax. For example
`Closes apache#123` indicates that this PR will close issue apache#123.
-->

- Closes #. apache#2035

## What changes are included in this PR?

<!--
Provide a summary of the modifications in this PR. List the main changes
such as new features, bug fixes, refactoring, or any other updates.
-->

## Are these changes tested?
Yes
<!--
Specify what test covers (unit test, integration test, etc.).

If tests are not included in your PR, please explain why (for example,
are they covered by existing tests)?
-->

(cherry picked from commit fea5906)
toutane pushed a commit to DataDog/iceberg-rust that referenced this pull request Apr 23, 2026
…ache#2026)

Add Core Encryption Primitives for Iceberg Encryption Support.

Part of apache#2034

## Summary

This PR introduces the foundational cryptographic primitives needed for
implementing encryption in iceberg-rust, providing AES-GCM encryption
operations that match the Java implementation's behavior and data
format.

 ## Motivation

Iceberg's Java implementation supports table-level encryption to protect
sensitive data at rest. To achieve feature parity and ensure
interoperability between Java and Rust implementations, we need to build
encryption support from the ground up. This PR provides the core
cryptographic operations that will serve as the foundation for the
complete encryption feature.

 ## Changes

  New Module: encryption

Added a new encryption module with core AES-GCM cryptographic
operations:

  - encryption/crypto.rs - Core encryption implementation
- EncryptionAlgorithm enum supporting AES-128-GCM as this is the only
algorithm currently supported in arrow parquet
    - SecureKey struct with automatic memory zeroization for security
- AesGcmEncryptor providing encrypt/decrypt operations with AAD support

  Key Features

1. Java-Compatible Format: Ciphertext format matches Java's
implementation exactly:
  [12-byte nonce][encrypted data][16-byte GCM authentication tag]
1. This ensures files encrypted by Java can be decrypted by Rust and
vice versa.
2. Secure Key Handling: Uses the zeroize crate to automatically clear
encryption keys from memory when dropped, preventing key material from
lingering in memory.
3. Additional Authenticated Data (AAD): Full support for AAD to ensure
integrity of associated metadata that isn't encrypted.
  4. Comprehensive Testing: 8 tests covering:
    - Round-trip encryption/decryption for both AES-128 and AES-256
    - AAD validation
    - Empty plaintext handling
    - Tamper detection
    - Format compatibility verification

  Dependencies Added

  - aes-gcm = "0.10" - Industry-standard AES-GCM implementation
  - zeroize = "1.7" - Secure memory cleanup for encryption keys

  Compatibility

This implementation directly corresponds to Java's
https://github.com/apache/iceberg/blob/main/core/src/main/java/org/apache/iceberg/encryption/Ciphers.java:

| Java Class | Rust Implementation |

|-----------------------------|------------------------------------------|
| Ciphers.AesGcmEncryptor | AesGcmEncryptor::encrypt() |
| Ciphers.AesGcmDecryptor | AesGcmEncryptor::decrypt() |
  | EncryptionAlgorithm.AES_GCM | EncryptionAlgorithm::Aes128Gcm|

  Testing

  Future Work

This PR is the first in a series to implement full encryption support.
Upcoming PRs will add:

  1. Table properties for encryption configuration
  2. Key management interfaces (KeyManagementClient trait)
  3. EncryptionManager implementation
  4. Native Parquet encryption integration
  5. AWS KMS support
  6. Integration with Table and FileIO

  Review Notes

  - This PR is intentionally minimal and self-contained
  - No existing code paths are modified - this is purely additive
  - The module is public but won't be used until future PRs wire it up
- Format compatibility with Java has been prioritized to ensure
interoperability

## Which issue does this PR close?

<!--
We generally require a GitHub issue to be filed for all bug fixes and
enhancements and this helps us generate change logs for our releases.
You can link an issue to this PR using the GitHub syntax. For example
`Closes apache#123` indicates that this PR will close issue apache#123.
-->

- Closes #. apache#2035

## What changes are included in this PR?

<!--
Provide a summary of the modifications in this PR. List the main changes
such as new features, bug fixes, refactoring, or any other updates.
-->

## Are these changes tested?
Yes
<!--
Specify what test covers (unit test, integration test, etc.).

If tests are not included in your PR, please explain why (for example,
are they covered by existing tests)?
-->

(cherry picked from commit fea5906)
aaron-perpetual added a commit to perpetualsystems/iceberg-rust that referenced this pull request May 4, 2026
* feat: Honor compression settings for metadata.json on write (#1876)

## Which issue does this PR close?

Split off from https://github.com/apache/iceberg-rust/pull/1851

- Partially fixes #1731.

## What changes are included in this PR?

This change honors the compression setting for metadata.json file
(`write.metadata.compression-codec`).

## Are these changes tested?

Add unit test to verify files are gzipped when the flag is enabled.

BREAKING CHANGE: Make `write_to` take `MetadataLocation`

---------

Co-authored-by: Kevin Liu <kevinjqliu@users.noreply.github.com>
Co-authored-by: Xuanwo <github@xuanwo.io>

* chore(deps): Bump quinn-proto from 0.11.13 to 0.11.14 in /bindings/python (#2228)

Bumps [quinn-proto](https://github.com/quinn-rs/quinn) from 0.11.13 to
0.11.14.
<details>
<summary>Release notes</summary>
<p><em>Sourced from <a
href="https://github.com/quinn-rs/quinn/releases">quinn-proto's
releases</a>.</em></p>
<blockquote>
<h2>quinn-proto 0.11.14</h2>
<p><a href="https://github.com/jxs"><code>@​jxs</code></a> reported a
denial of service issue in quinn-proto 5 days ago:</p>
<ul>
<li><a
href="https://github.com/quinn-rs/quinn/security/advisories/GHSA-6xvm-j4wr-6v98">https://github.com/quinn-rs/quinn/security/advisories/GHSA-6xvm-j4wr-6v98</a></li>
</ul>
<p>We coordinated with them to release this version to patch the issue.
Unfortunately the maintainers missed these issues during code review and
we did not have enough fuzzing coverage -- we regret the oversight and
have added an additional fuzzing target.</p>
<p>Organizations that want to participate in coordinated disclosure can
contact us privately to discuss terms.</p>
<h2>What's Changed</h2>
<ul>
<li>Fix over-permissive proto dependency edge by <a
href="https://github.com/Ralith"><code>@​Ralith</code></a> in <a
href="https://redirect.github.com/quinn-rs/quinn/pull/2385">quinn-rs/quinn#2385</a></li>
<li>0.11.x: avoid unwrapping VarInt decoding during parameter parsing by
<a href="https://github.com/djc"><code>@​djc</code></a> in <a
href="https://redirect.github.com/quinn-rs/quinn/pull/2559">quinn-rs/quinn#2559</a></li>
</ul>
</blockquote>
</details>
<details>
<summary>Commits</summary>
<ul>
<li><a
href="https://github.com/quinn-rs/quinn/commit/2c315aa7f9c2a6c1db87f8f51f40623a427c78fd"><code>2c315aa</code></a>
proto: bump version to 0.11.14</li>
<li><a
href="https://github.com/quinn-rs/quinn/commit/8ad47f431e7deb82c08b09c2e33ef85aa88fd212"><code>8ad47f4</code></a>
Use newer rustls-pki-types PEM parser API</li>
<li><a
href="https://github.com/quinn-rs/quinn/commit/c81c0289abe30d8437ccbf9b6304e2bc9c707cea"><code>c81c028</code></a>
ci: fix workflow syntax</li>
<li><a
href="https://github.com/quinn-rs/quinn/commit/0050172969f7e69e136c433181330da7790d8d73"><code>0050172</code></a>
ci: pin wasm-bindgen-cli version</li>
<li><a
href="https://github.com/quinn-rs/quinn/commit/8a6f82c58d1c565eab78f986e614223e6ed76a85"><code>8a6f82c</code></a>
Take semver-compatible dependency updates</li>
<li><a
href="https://github.com/quinn-rs/quinn/commit/e52db4ad8df0f9720e7b0e32ecc0e48c9a93de0f"><code>e52db4a</code></a>
Apply suggestions from clippy 1.91</li>
<li><a
href="https://github.com/quinn-rs/quinn/commit/6df7275c582ca9b7225e0ccf9f9871a55eb73155"><code>6df7275</code></a>
chore: Fix <code>unnecessary_unwrap</code> clippy</li>
<li><a
href="https://github.com/quinn-rs/quinn/commit/c8eefa07e087b06d8f2b78ff262ce8ac952994f1"><code>c8eefa0</code></a>
proto: avoid unwrapping varint decoding during parameters parsing</li>
<li><a
href="https://github.com/quinn-rs/quinn/commit/9723a977754c8662001b0fef97aab8f3ddf1df92"><code>9723a97</code></a>
fuzz: add fuzzing target for parsing transport parameters</li>
<li><a
href="https://github.com/quinn-rs/quinn/commit/eaf0ef30252cef4acec21f150427e604cd4271c9"><code>eaf0ef3</code></a>
Fix over-permissive proto dependency edge (<a
href="https://redirect.github.com/quinn-rs/quinn/issues/2385">#2385</a>)</li>
<li>Additional commits viewable in <a
href="https://github.com/quinn-rs/quinn/compare/quinn-proto-0.11.13...quinn-proto-0.11.14">compare
view</a></li>
</ul>
</details>
<br />


[![Dependabot compatibility
score](https://dependabot-badges.githubapp.com/badges/compatibility_score?dependency-name=quinn-proto&package-manager=cargo&previous-version=0.11.13&new-version=0.11.14)](https://docs.github.com/en/github/managing-security-vulnerabilities/about-dependabot-security-updates#about-compatibility-scores)

Dependabot will resolve any conflicts with this PR as long as you don't
alter it yourself. You can also trigger a rebase manually by commenting
`@dependabot rebase`.

[//]: # (dependabot-automerge-start)
[//]: # (dependabot-automerge-end)

---

<details>
<summary>Dependabot commands and options</summary>
<br />

You can trigger Dependabot actions by commenting on this PR:
- `@dependabot rebase` will rebase this PR
- `@dependabot recreate` will recreate this PR, overwriting any edits
that have been made to it
- `@dependabot show <dependency name> ignore conditions` will show all
of the ignore conditions of the specified dependency
- `@dependabot ignore this major version` will close this PR and stop
Dependabot creating any more for this major version (unless you reopen
the PR or upgrade to it yourself)
- `@dependabot ignore this minor version` will close this PR and stop
Dependabot creating any more for this minor version (unless you reopen
the PR or upgrade to it yourself)
- `@dependabot ignore this dependency` will close this PR and stop
Dependabot creating any more for this dependency (unless you reopen the
PR or upgrade to it yourself)
You can disable automated security fix PRs for this repo from the
[Security Alerts
page](https://github.com/apache/iceberg-rust/network/alerts).

</details>

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>

* Add catalog test suite to unify catalog's behavior. (#2131)

## Which issue does this PR close?

- Closes #2086 .

## What changes are included in this PR?

In this pr we introduced catalog test suite in catalog-loader, which
could unify the behavior of catalogs.

## Are these changes tested?

Yes.

---------

Co-authored-by: Ray Liu <liurenjie2008@gmail.com>

* chore(deps): Bump datafusion from 52.2.0 to 52.3.0 (#2235)

Bumps [datafusion](https://github.com/apache/datafusion) from 52.2.0 to
52.3.0.
<details>
<summary>Commits</summary>
<ul>
<li><a
href="https://github.com/apache/datafusion/commit/28d012a41a3017b5f682ef6b01468a7ff9a48fb7"><code>28d012a</code></a>
[branch-52] Bump to 52.3.0 and changelog (<a
href="https://redirect.github.com/apache/datafusion/issues/20790">#20790</a>)</li>
<li><a
href="https://github.com/apache/datafusion/commit/1bd7082b798d0d55c1e90c7be1d7e3dba057c288"><code>1bd7082</code></a>
[branch-52] Fix repartition from dropping data when spilling (<a
href="https://redirect.github.com/apache/datafusion/issues/20672">#20672</a>)
(<a
href="https://redirect.github.com/apache/datafusion/issues/20777">#20777</a>)</li>
<li><a
href="https://github.com/apache/datafusion/commit/9797095e152749721bec07c0944fe664acaa0849"><code>9797095</code></a>
[branch-52] perf: sort replace free()-&gt;try_grow() pattern with
try_resize() t...</li>
<li><a
href="https://github.com/apache/datafusion/commit/afc1c72a15bdd31e15a7e354e86a505be7882f08"><code>afc1c72</code></a>
[branch-52] FFI_TableOptions are using default values only (<a
href="https://redirect.github.com/apache/datafusion/issues/20705">#20705</a>)</li>
<li><a
href="https://github.com/apache/datafusion/commit/d317d00b886bbf11cb489e4c4bdc2280b3ca9e07"><code>d317d00</code></a>
[branch-52] fix: <code>HashJoin</code> panic with String dictionary keys
(don't flatten ...</li>
<li><a
href="https://github.com/apache/datafusion/commit/72ea8ec086e59220f6b255ea565e710990ad7967"><code>72ea8ec</code></a>
[branch-52] Fix constant value from stats (<a
href="https://redirect.github.com/apache/datafusion/issues/20042">#20042</a>)
(<a
href="https://redirect.github.com/apache/datafusion/issues/20709">#20709</a>)</li>
<li><a
href="https://github.com/apache/datafusion/commit/9a67de58c027e6057aa37327ae4d0192d5c45fc5"><code>9a67de5</code></a>
[branch-52] Fix Arrow Spill Underrun (<a
href="https://redirect.github.com/apache/datafusion/issues/20159">#20159</a>)
(<a
href="https://redirect.github.com/apache/datafusion/issues/20684">#20684</a>)</li>
<li><a
href="https://github.com/apache/datafusion/commit/19a0fcaa276c86beda544c6e01c75f6e0639767e"><code>19a0fca</code></a>
[branch-52] SortMergeJoin don't wait for all input before emitting (<a
href="https://redirect.github.com/apache/datafusion/issues/20699">#20699</a>)</li>
<li>See full diff in <a
href="https://github.com/apache/datafusion/compare/52.2.0...52.3.0">compare
view</a></li>
</ul>
</details>
<br />


[![Dependabot compatibility
score](https://dependabot-badges.githubapp.com/badges/compatibility_score?dependency-name=datafusion&package-manager=cargo&previous-version=52.2.0&new-version=52.3.0)](https://docs.github.com/en/github/managing-security-vulnerabilities/about-dependabot-security-updates#about-compatibility-scores)

Dependabot will resolve any conflicts with this PR as long as you don't
alter it yourself. You can also trigger a rebase manually by commenting
`@dependabot rebase`.

[//]: # (dependabot-automerge-start)
[//]: # (dependabot-automerge-end)

---

<details>
<summary>Dependabot commands and options</summary>
<br />

You can trigger Dependabot actions by commenting on this PR:
- `@dependabot rebase` will rebase this PR
- `@dependabot recreate` will recreate this PR, overwriting any edits
that have been made to it
- `@dependabot show <dependency name> ignore conditions` will show all
of the ignore conditions of the specified dependency
- `@dependabot ignore this major version` will close this PR and stop
Dependabot creating any more for this major version (unless you reopen
the PR or upgrade to it yourself)
- `@dependabot ignore this minor version` will close this PR and stop
Dependabot creating any more for this minor version (unless you reopen
the PR or upgrade to it yourself)
- `@dependabot ignore this dependency` will close this PR and stop
Dependabot creating any more for this dependency (unless you reopen the
PR or upgrade to it yourself)


</details>

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>

* chore(deps): Bump serde_with from 3.17.0 to 3.18.0 (#2233)

Bumps [serde_with](https://github.com/jonasbb/serde_with) from 3.17.0 to
3.18.0.
<details>
<summary>Release notes</summary>
<p><em>Sourced from <a
href="https://github.com/jonasbb/serde_with/releases">serde_with's
releases</a>.</em></p>
<blockquote>
<h2>serde_with v3.18.0</h2>
<h3>Added</h3>
<ul>
<li>Support <code>OneOrMany</code> with more sequence and set types (<a
href="https://redirect.github.com/jonasbb/serde_with/issues/929">#929</a>)</li>
</ul>
<h3>Changed</h3>
<ul>
<li>Bump MSRV to 1.88 due to the <code>darling</code> dependency</li>
</ul>
</blockquote>
</details>
<details>
<summary>Commits</summary>
<ul>
<li><a
href="https://github.com/jonasbb/serde_with/commit/d50ec962c6ecad7d8972f95d7ee7cea398b7eb41"><code>d50ec96</code></a>
Bump version to 3.18.0 (<a
href="https://redirect.github.com/jonasbb/serde_with/issues/931">#931</a>)</li>
<li><a
href="https://github.com/jonasbb/serde_with/commit/984fe3252ecd47526f452e39736f70f96b503f7c"><code>984fe32</code></a>
Bump version to 3.18.0</li>
<li><a
href="https://github.com/jonasbb/serde_with/commit/4ba41c70c7f12b2e543ae81480a50b4d76245419"><code>4ba41c7</code></a>
Bump actions/upload-artifact from 6 to 7 in the github-actions group (<a
href="https://redirect.github.com/jonasbb/serde_with/issues/927">#927</a>)</li>
<li><a
href="https://github.com/jonasbb/serde_with/commit/8fb2468ce24e822fc29cd9aa8ebb3feb3ddf1eb3"><code>8fb2468</code></a>
Bump actions/upload-artifact from 6 to 7 in the github-actions
group</li>
<li><a
href="https://github.com/jonasbb/serde_with/commit/aec0a23c15943bc4ca82d329695fabefb2b19174"><code>aec0a23</code></a>
Bump MSRV to 1.88 (<a
href="https://redirect.github.com/jonasbb/serde_with/issues/930">#930</a>)</li>
<li><a
href="https://github.com/jonasbb/serde_with/commit/25c15a2c5c53f8fa71af91d699877147568338b8"><code>25c15a2</code></a>
Update time dependency to 0.3.47</li>
<li><a
href="https://github.com/jonasbb/serde_with/commit/93bd3f4bebec516e5608a12f09ad1859cdced9a7"><code>93bd3f4</code></a>
Update test output after darling update</li>
<li><a
href="https://github.com/jonasbb/serde_with/commit/f825dbffb12dd758c80247259a271956f1c484b4"><code>f825dbf</code></a>
Upgrade darling to 0.23.0</li>
<li><a
href="https://github.com/jonasbb/serde_with/commit/65cbd738f090f25d89ec4b350501b4aa5b38bd9e"><code>65cbd73</code></a>
Bump MSRV to 1.88</li>
<li><a
href="https://github.com/jonasbb/serde_with/commit/daff02ea264c3136131bfcff079304714f359bd9"><code>daff02e</code></a>
Extend OneOrMany implementation to more collection types (<a
href="https://redirect.github.com/jonasbb/serde_with/issues/929">#929</a>)</li>
<li>Additional commits viewable in <a
href="https://github.com/jonasbb/serde_with/compare/v3.17.0...v3.18.0">compare
view</a></li>
</ul>
</details>
<br />


[![Dependabot compatibility
score](https://dependabot-badges.githubapp.com/badges/compatibility_score?dependency-name=serde_with&package-manager=cargo&previous-version=3.17.0&new-version=3.18.0)](https://docs.github.com/en/github/managing-security-vulnerabilities/about-dependabot-security-updates#about-compatibility-scores)

Dependabot will resolve any conflicts with this PR as long as you don't
alter it yourself. You can also trigger a rebase manually by commenting
`@dependabot rebase`.

[//]: # (dependabot-automerge-start)
[//]: # (dependabot-automerge-end)

---

<details>
<summary>Dependabot commands and options</summary>
<br />

You can trigger Dependabot actions by commenting on this PR:
- `@dependabot rebase` will rebase this PR
- `@dependabot recreate` will recreate this PR, overwriting any edits
that have been made to it
- `@dependabot show <dependency name> ignore conditions` will show all
of the ignore conditions of the specified dependency
- `@dependabot ignore this major version` will close this PR and stop
Dependabot creating any more for this major version (unless you reopen
the PR or upgrade to it yourself)
- `@dependabot ignore this minor version` will close this PR and stop
Dependabot creating any more for this minor version (unless you reopen
the PR or upgrade to it yourself)
- `@dependabot ignore this dependency` will close this PR and stop
Dependabot creating any more for this dependency (unless you reopen the
PR or upgrade to it yourself)


</details>

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>

* chore(deps): Bump tempfile from 3.26.0 to 3.27.0 (#2234)

* chore(deps): Bump lz4_flex from 0.12.0 to 0.12.1 (#2239)

Bumps [lz4_flex](https://github.com/pseitz/lz4_flex) from 0.12.0 to
0.12.1.
<details>
<summary>Changelog</summary>
<p><em>Sourced from <a
href="https://github.com/PSeitz/lz4_flex/blob/main/CHANGELOG.md">lz4_flex's
changelog</a>.</em></p>
<blockquote>
<h1>0.12.1 (2026-03-14)</h1>
<h3>Security Fix</h3>
<ul>
<li>Fix handling of invalid match offsets during decompression <a
href="https://github.com/PSeitz/lz4_flex/commit/a0b9154">#a0b9154</a>
(thanks <a
href="https://github.com/Marcono1234"><code>@​Marcono1234</code></a>)</li>
</ul>
<pre><code>Invalid match offsets (offset == 0) during decompression were
not properly
handled, which could lead to invalid memory reads on untrusted input.
Users on 0.12.x should upgrade to 0.12.1.
</code></pre>
</blockquote>
</details>
<details>
<summary>Commits</summary>
<ul>
<li><a
href="https://github.com/PSeitz/lz4_flex/commit/fa48c987a88df5059a49fe7519c028d6f2b8caf4"><code>fa48c98</code></a>
bump version to 0.12.1</li>
<li><a
href="https://github.com/PSeitz/lz4_flex/commit/a0b9154becbe22da3ce91211d7b6619c289723cf"><code>a0b9154</code></a>
fix handling of invalid match offsets during decompression</li>
<li>See full diff in <a
href="https://github.com/pseitz/lz4_flex/compare/0.12.0...0.12.1">compare
view</a></li>
</ul>
</details>
<br />


[![Dependabot compatibility
score](https://dependabot-badges.githubapp.com/badges/compatibility_score?dependency-name=lz4_flex&package-manager=cargo&previous-version=0.12.0&new-version=0.12.1)](https://docs.github.com/en/github/managing-security-vulnerabilities/about-dependabot-security-updates#about-compatibility-scores)

Dependabot will resolve any conflicts with this PR as long as you don't
alter it yourself. You can also trigger a rebase manually by commenting
`@dependabot rebase`.

[//]: # (dependabot-automerge-start)
[//]: # (dependabot-automerge-end)

---

<details>
<summary>Dependabot commands and options</summary>
<br />

You can trigger Dependabot actions by commenting on this PR:
- `@dependabot rebase` will rebase this PR
- `@dependabot recreate` will recreate this PR, overwriting any edits
that have been made to it
- `@dependabot show <dependency name> ignore conditions` will show all
of the ignore conditions of the specified dependency
- `@dependabot ignore this major version` will close this PR and stop
Dependabot creating any more for this major version (unless you reopen
the PR or upgrade to it yourself)
- `@dependabot ignore this minor version` will close this PR and stop
Dependabot creating any more for this minor version (unless you reopen
the PR or upgrade to it yourself)
- `@dependabot ignore this dependency` will close this PR and stop
Dependabot creating any more for this dependency (unless you reopen the
PR or upgrade to it yourself)
You can disable automated security fix PRs for this repo from the
[Security Alerts
page](https://github.com/apache/iceberg-rust/network/alerts).

</details>

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>

* chore(deps): Bump lz4_flex from 0.12.0 to 0.12.1 in /bindings/python (#2238)

Bumps [lz4_flex](https://github.com/pseitz/lz4_flex) from 0.12.0 to
0.12.1.
<details>
<summary>Changelog</summary>
<p><em>Sourced from <a
href="https://github.com/PSeitz/lz4_flex/blob/main/CHANGELOG.md">lz4_flex's
changelog</a>.</em></p>
<blockquote>
<h1>0.12.1 (2026-03-14)</h1>
<h3>Security Fix</h3>
<ul>
<li>Fix handling of invalid match offsets during decompression <a
href="https://github.com/PSeitz/lz4_flex/commit/a0b9154">#a0b9154</a>
(thanks <a
href="https://github.com/Marcono1234"><code>@​Marcono1234</code></a>)</li>
</ul>
<pre><code>Invalid match offsets (offset == 0) during decompression were
not properly
handled, which could lead to invalid memory reads on untrusted input.
Users on 0.12.x should upgrade to 0.12.1.
</code></pre>
</blockquote>
</details>
<details>
<summary>Commits</summary>
<ul>
<li><a
href="https://github.com/PSeitz/lz4_flex/commit/fa48c987a88df5059a49fe7519c028d6f2b8caf4"><code>fa48c98</code></a>
bump version to 0.12.1</li>
<li><a
href="https://github.com/PSeitz/lz4_flex/commit/a0b9154becbe22da3ce91211d7b6619c289723cf"><code>a0b9154</code></a>
fix handling of invalid match offsets during decompression</li>
<li>See full diff in <a
href="https://github.com/pseitz/lz4_flex/compare/0.12.0...0.12.1">compare
view</a></li>
</ul>
</details>
<br />


[![Dependabot compatibility
score](https://dependabot-badges.githubapp.com/badges/compatibility_score?dependency-name=lz4_flex&package-manager=cargo&previous-version=0.12.0&new-version=0.12.1)](https://docs.github.com/en/github/managing-security-vulnerabilities/about-dependabot-security-updates#about-compatibility-scores)

Dependabot will resolve any conflicts with this PR as long as you don't
alter it yourself. You can also trigger a rebase manually by commenting
`@dependabot rebase`.

[//]: # (dependabot-automerge-start)
[//]: # (dependabot-automerge-end)

---

<details>
<summary>Dependabot commands and options</summary>
<br />

You can trigger Dependabot actions by commenting on this PR:
- `@dependabot rebase` will rebase this PR
- `@dependabot recreate` will recreate this PR, overwriting any edits
that have been made to it
- `@dependabot show <dependency name> ignore conditions` will show all
of the ignore conditions of the specified dependency
- `@dependabot ignore this major version` will close this PR and stop
Dependabot creating any more for this major version (unless you reopen
the PR or upgrade to it yourself)
- `@dependabot ignore this minor version` will close this PR and stop
Dependabot creating any more for this minor version (unless you reopen
the PR or upgrade to it yourself)
- `@dependabot ignore this dependency` will close this PR and stop
Dependabot creating any more for this dependency (unless you reopen the
PR or upgrade to it yourself)
You can disable automated security fix PRs for this repo from the
[Security Alerts
page](https://github.com/apache/iceberg-rust/network/alerts).

</details>

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Co-authored-by: blackmwk <liurenjie1024@outlook.com>

* feat(io): Add delete_stream to Storage trait (#2216)

## Which issue does this PR close?

<!--
We generally require a GitHub issue to be filed for all bug fixes and
enhancements and this helps us generate change logs for our releases.
You can link an issue to this PR using the GitHub syntax. For example
`Closes #123` indicates that this PR will close issue #123.
-->

- Closes #2065 

## What changes are included in this PR?
- Add `delete_stream` to `Storage` trait to support batch delete
- Expose `delete_stream` in `FileIO` as well
<!--
Provide a summary of the modifications in this PR. List the main changes
such as new features, bug fixes, refactoring, or any other updates.
-->

## Are these changes tested?
Added uts
Addded integtests for opendal
<!--
Specify what test covers (unit test, integration test, etc.).

If tests are not included in your PR, please explain why (for example,
are they covered by existing tests)?
-->

* feat(storage): implement opendal resolving storage (#2231)

## Which issue does this PR close?

<!--
We generally require a GitHub issue to be filed for all bug fixes and
enhancements and this helps us generate change logs for our releases.
You can link an issue to this PR using the GitHub syntax. For example
`Closes #123` indicates that this PR will close issue #123.
-->

- Closes #2210

## What changes are included in this PR?
- Add OpenDalResolvingStorage
<!--
Provide a summary of the modifications in this PR. List the main changes
such as new features, bug fixes, refactoring, or any other updates.
-->

## Are these changes tested?
Added a new test
<!--
Specify what test covers (unit test, integration test, etc.).

If tests are not included in your PR, please explain why (for example,
are they covered by existing tests)?
-->

* doc: Update README.md to include more components (#2248)

## Which issue does this PR close?

<!--
We generally require a GitHub issue to be filed for all bug fixes and
enhancements and this helps us generate change logs for our releases.
You can link an issue to this PR using the GitHub syntax. For example
`Closes #123` indicates that this PR will close issue #123.
-->

- Closes #.

## What changes are included in this PR?

<!--
Provide a summary of the modifications in this PR. List the main changes
such as new features, bug fixes, refactoring, or any other updates.
-->

## Are these changes tested?

<!--
Specify what test covers (unit test, integration test, etc.).

If tests are not included in your PR, please explain why (for example,
are they covered by existing tests)?
-->

* fix(python): use resolving storage for python binding (#2246)

* chore: Change publish parallism back to 1 (#2254)

## Which issue does this PR close?

<!--
We generally require a GitHub issue to be filed for all bug fixes and
enhancements and this helps us generate change logs for our releases.
You can link an issue to this PR using the GitHub syntax. For example
`Closes #123` indicates that this PR will close issue #123.
-->

- publish has to be done one by one, otherwise we may see failure like
this: https://github.com/apache/iceberg-rust/actions/runs/23260056698

## What changes are included in this PR?
- Change publish parallism back to 1
<!--
Provide a summary of the modifications in this PR. List the main changes
such as new features, bug fixes, refactoring, or any other updates.
-->

## Are these changes tested?

<!--
Specify what test covers (unit test, integration test, etc.).

If tests are not included in your PR, please explain why (for example,
are they covered by existing tests)?
-->

* Infra: Remove GitHub Actions from Dependabot configuration (#2267)

Removed GitHub Actions dependency update configuration.

## Which issue does this PR close?

<!--
We generally require a GitHub issue to be filed for all bug fixes and
enhancements and this helps us generate change logs for our releases.
You can link an issue to this PR using the GitHub syntax. For example
`Closes #123` indicates that this PR will close issue #123.
-->

- Closes #.

## What changes are included in this PR?
Related to https://github.com/apache/iceberg-python/issues/3186

Dont auto update since we now depend on github action being allowlisted
by asf-infra first,
https://github.com/apache/infrastructure-actions/blob/main/approved_patterns.yml

<!--
Provide a summary of the modifications in this PR. List the main changes
such as new features, bug fixes, refactoring, or any other updates.
-->

## Are these changes tested?

<!--
Specify what test covers (unit test, integration test, etc.).

If tests are not included in your PR, please explain why (for example,
are they covered by existing tests)?
-->

* ci: pin third-party actions to Apache-approved SHAs (#2266)

## Which issue does this PR close?

<!--
We generally require a GitHub issue to be filed for all bug fixes and
enhancements and this helps us generate change logs for our releases.
You can link an issue to this PR using the GitHub syntax. For example
`Closes #123` indicates that this PR will close issue #123.
-->

- Closes #.

## What changes are included in this PR?
Pin `astral-sh/setup-uv` to commit SHAs from Apache's
[infrastructure-actions
allowlist](https://github.com/apache/infrastructure-actions/blob/07f5f9d2b05fe0ec9886e3ef0a9d79797817f0cb/approved_patterns.yml#L9)

Fixes https://github.com/apache/infrastructure-actions/issues/550

<!--
Provide a summary of the modifications in this PR. List the main changes
such as new features, bug fixes, refactoring, or any other updates.
-->

## Are these changes tested?

<!--
Specify what test covers (unit test, integration test, etc.).

If tests are not included in your PR, please explain why (for example,
are they covered by existing tests)?
-->

* chore(deps): fix audit check and disable inherited aws sdk default features (#2274)

## Which issue does this PR close?

- Fix the audit check by updating `aws-lc-sys` and `rustls-webpki`.
- Avoid pulling both the legacy `rustls` / Hyper 0.14 stack and the
newer `default-https-client` stack through inherited AWS SDK defaults.
([AWS SDK
announcement](https://github.com/awslabs/aws-sdk-rust/discussions/1257))

## What changes are included in this PR?

- Bump to `aws-lc-sys>=0.39.0` and `rustls-webpki>=0.103.10` to pass
security audit.
- Disable inherited AWS SDK default features for `aws-sdk-glue` and
`aws-sdk-s3tables`
- Explicitly enable `default-https-client` and `rt-tokio`
- Bump the minimum `aws-sdk-glue` version to `1.85`, the first version
that provides `default-https-client`

## Are these changes tested?

---------

Co-authored-by: blackmwk <liurenjie1024@outlook.com>

* chore(deps): Bump minijinja from 2.17.1 to 2.18.0 (#2273)

Bumps [minijinja](https://github.com/mitsuhiko/minijinja) from 2.17.1 to
2.18.0.
<details>
<summary>Changelog</summary>
<p><em>Sourced from <a
href="https://github.com/mitsuhiko/minijinja/blob/main/CHANGELOG.md">minijinja's
changelog</a>.</em></p>
<blockquote>
<h2>2.18.0</h2>
<ul>
<li>Added keyword argument support (<code>width</code>,
<code>first</code>, <code>blank</code>) to the <code>indent</code>
filter for Jinja2 compatibility in Rust and Go. <a
href="https://redirect.github.com/mitsuhiko/minijinja/issues/864">#864</a></li>
<li>Added support for dotted integer lookup (for example
<code>foo.0</code>) in Rust and Go for Jinja compatibility. <a
href="https://redirect.github.com/mitsuhiko/minijinja/issues/881">#881</a></li>
<li>Added support for dotted filter and test names (including <code>foo
. bar . baz</code>) for Jinja compatibility. <a
href="https://redirect.github.com/mitsuhiko/minijinja/issues/879">#879</a></li>
<li>Fixed string escape handling to preserve unknown escapes (such as
<code>\s</code>) for Jinja compatibility in Rust and Go. <a
href="https://redirect.github.com/mitsuhiko/minijinja/issues/880">#880</a></li>
<li>Improved generic performance across template parsing, compilation,
and rendering.</li>
<li>Fixed <code>minijinja-cabi</code> ownership and pointer-safety
issues that could leak <code>mj_value</code>
values on error paths.</li>
<li>Added high-priority <code>minijinja-cabi</code> APIs for
callback-based functions/filters/tests,
globals, loaders, path joining, auto-escape configuration, and fuel
limits.</li>
<li>Switched <code>minijinja-cabi</code> header maintenance to manual
source-based syncing and
removed cbindgen-based generation tooling.</li>
<li>Added lightweight C smoke tests for <code>minijinja-cabi</code> (via
<code>make -C minijinja-cabi test</code>)
with coverage across all exported C ABI functions, and wired them into
top-level
testing and CI.</li>
<li>Added <code>render_captured</code> and
<code>render_captured_to</code> methods on <code>Template</code> which
return a <code>Captured</code> type holding the rendered output and the
template state.</li>
<li>Added <code>into_output</code> method on <code>Captured</code> to
consume and return the output string.</li>
<li>Deprecated <code>render_and_return_state</code>,
<code>eval_to_state</code>, and <code>render_to_write</code>
in favor of the new <code>render_captured</code> /
<code>render_captured_to</code> / <code>Captured</code> API.</li>
</ul>
</blockquote>
</details>
<details>
<summary>Commits</summary>
<ul>
<li><a
href="https://github.com/mitsuhiko/minijinja/commit/92f114d1fd62525b2b4dc1adb77ae1e83c1214a9"><code>92f114d</code></a>
release 2.18.0</li>
<li><a
href="https://github.com/mitsuhiko/minijinja/commit/80d30a7526a0119981a1664fab8036b7e64c0d14"><code>80d30a7</code></a>
refactor(vendor): prune unused self_cell API surface</li>
<li><a
href="https://github.com/mitsuhiko/minijinja/commit/50ce37a18ad368f22b4c40ff2b3355895ff58556"><code>50ce37a</code></a>
fix: typos</li>
<li><a
href="https://github.com/mitsuhiko/minijinja/commit/24891e10c207846fa264c0f8eca930045bbb5fca"><code>24891e1</code></a>
feat(filters): add kwargs support to indent filter for Jinja2
parity</li>
<li><a
href="https://github.com/mitsuhiko/minijinja/commit/4cca670f8a346832771d2a567f778b5dc4058156"><code>4cca670</code></a>
refactor: deprecate render_to_write in favor of render_captured_to</li>
<li><a
href="https://github.com/mitsuhiko/minijinja/commit/ac88f8e619e0b7d5a4e23819ed5d2ebc046029c6"><code>ac88f8e</code></a>
fix: correct typo render_capturedd_to -&gt; render_captured_to</li>
<li><a
href="https://github.com/mitsuhiko/minijinja/commit/710137b2626cfae81b1eb935ea4c9df2435c053d"><code>710137b</code></a>
chore: remove dead_code allow and unused MutBorrow from vendored
self_cell</li>
<li><a
href="https://github.com/mitsuhiko/minijinja/commit/39d00e61a9f7246b7015dcf655f11159cde1d8cd"><code>39d00e6</code></a>
feat: Added new capture methods for state</li>
<li><a
href="https://github.com/mitsuhiko/minijinja/commit/42b0d089333363b8bd667ec99ab67ff7977ef6d4"><code>42b0d08</code></a>
feat: vendor self_cell and make loader default</li>
<li><a
href="https://github.com/mitsuhiko/minijinja/commit/cc12ae0812b8d85dd5963cfa373971fb0b1ff6da"><code>cc12ae0</code></a>
fix: make cabi compatible with older rustc</li>
<li>Additional commits viewable in <a
href="https://github.com/mitsuhiko/minijinja/compare/minijinja-go/v2.17.1...minijinja-go/v2.18.0">compare
view</a></li>
</ul>
</details>
<br />


[![Dependabot compatibility
score](https://dependabot-badges.githubapp.com/badges/compatibility_score?dependency-name=minijinja&package-manager=cargo&previous-version=2.17.1&new-version=2.18.0)](https://docs.github.com/en/github/managing-security-vulnerabilities/about-dependabot-security-updates#about-compatibility-scores)

Dependabot will resolve any conflicts with this PR as long as you don't
alter it yourself. You can also trigger a rebase manually by commenting
`@dependabot rebase`.

[//]: # (dependabot-automerge-start)
[//]: # (dependabot-automerge-end)

---

<details>
<summary>Dependabot commands and options</summary>
<br />

You can trigger Dependabot actions by commenting on this PR:
- `@dependabot rebase` will rebase this PR
- `@dependabot recreate` will recreate this PR, overwriting any edits
that have been made to it
- `@dependabot show <dependency name> ignore conditions` will show all
of the ignore conditions of the specified dependency
- `@dependabot ignore this major version` will close this PR and stop
Dependabot creating any more for this major version (unless you reopen
the PR or upgrade to it yourself)
- `@dependabot ignore this minor version` will close this PR and stop
Dependabot creating any more for this minor version (unless you reopen
the PR or upgrade to it yourself)
- `@dependabot ignore this dependency` will close this PR and stop
Dependabot creating any more for this dependency (unless you reopen the
PR or upgrade to it yourself)


</details>

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Co-authored-by: blackmwk <liurenjie1024@outlook.com>

* chore(deps): Bump datafusion from 52.3.0 to 52.4.0 (#2271)

Bumps [datafusion](https://github.com/apache/datafusion) from 52.3.0 to
52.4.0.
<details>
<summary>Commits</summary>
<ul>
<li><a
href="https://github.com/apache/datafusion/commit/e5bad58716cf74612ff3b245010411425063c3ec"><code>e5bad58</code></a>
[branch-52] Update version to 52.4.0 and update changelog (<a
href="https://redirect.github.com/apache/datafusion/issues/21004">#21004</a>)</li>
<li><a
href="https://github.com/apache/datafusion/commit/e034c6b0b103c674c4576644007b30480565bec3"><code>e034c6b</code></a>
[branch-52] Update to use lz4_flex 0.12.1 and quinn-proto 0.11.14 (<a
href="https://redirect.github.com/apache/datafusion/issues/21009">#21009</a>)</li>
<li><a
href="https://github.com/apache/datafusion/commit/664099b60640097a982e63174a96d8828fe1dc0d"><code>664099b</code></a>
[branch-52] fix: InList Dictionary filter pushdown type mismatch (<a
href="https://redirect.github.com/apache/datafusion/issues/20962">#20962</a>)
(<a
href="https://redirect.github.com/apache/datafusion/issues/2">#2</a>...</li>
<li><a
href="https://github.com/apache/datafusion/commit/74aaa65001afd7bc649f471bcf634d52744c46fd"><code>74aaa65</code></a>
[branch-52] chore: Ignore RUSTSEC-2024-0014 (<a
href="https://redirect.github.com/apache/datafusion/issues/20862">#20862</a>)
(<a
href="https://redirect.github.com/apache/datafusion/issues/21020">#21020</a>)</li>
<li><a
href="https://github.com/apache/datafusion/commit/5881edec5d937036891bbec9e7cb01837d9155a5"><code>5881ede</code></a>
[branch-52] fix: SanityCheckPlan error with window functions and NVL
filter (...</li>
<li><a
href="https://github.com/apache/datafusion/commit/7e20eb7ddb3acf8174af7adec52859e28333d570"><code>7e20eb7</code></a>
[branch-52] perf: Cache num_output_rows in sort merge join to avoid O(n)
reco...</li>
<li><a
href="https://github.com/apache/datafusion/commit/e5547e2772fbaed693e7472f38feab690a7fe3ef"><code>e5547e2</code></a>
[branch-52] Fix duplicate group keys after hash aggregation spill (<a
href="https://redirect.github.com/apache/datafusion/issues/20724">#20724</a>)
(#...</li>
<li><a
href="https://github.com/apache/datafusion/commit/2947378e9ef9dbdda75b4ff047edcfc1a06ef0d2"><code>2947378</code></a>
[branch-52] fix: disable dynamic filter pushdown for non min/max
aggregates (...</li>
<li><a
href="https://github.com/apache/datafusion/commit/41acbf8e4bb4ac15003bd5365661e6b17551f7f0"><code>41acbf8</code></a>
[branch-52] fix: Return <code>probe_side.len()</code> for RightMark/Anti
count(*) querie...</li>
<li><a
href="https://github.com/apache/datafusion/commit/a5f6fbb4cd89a47e1036986abe201def15542093"><code>a5f6fbb</code></a>
[branch-52] fix: interval analysis error when have two filterexec that
inner ...</li>
<li>Additional commits viewable in <a
href="https://github.com/apache/datafusion/compare/52.3.0...52.4.0">compare
view</a></li>
</ul>
</details>
<br />


[![Dependabot compatibility
score](https://dependabot-badges.githubapp.com/badges/compatibility_score?dependency-name=datafusion&package-manager=cargo&previous-version=52.3.0&new-version=52.4.0)](https://docs.github.com/en/github/managing-security-vulnerabilities/about-dependabot-security-updates#about-compatibility-scores)

Dependabot will resolve any conflicts with this PR as long as you don't
alter it yourself. You can also trigger a rebase manually by commenting
`@dependabot rebase`.

[//]: # (dependabot-automerge-start)
[//]: # (dependabot-automerge-end)

---

<details>
<summary>Dependabot commands and options</summary>
<br />

You can trigger Dependabot actions by commenting on this PR:
- `@dependabot rebase` will rebase this PR
- `@dependabot recreate` will recreate this PR, overwriting any edits
that have been made to it
- `@dependabot show <dependency name> ignore conditions` will show all
of the ignore conditions of the specified dependency
- `@dependabot ignore this major version` will close this PR and stop
Dependabot creating any more for this major version (unless you reopen
the PR or upgrade to it yourself)
- `@dependabot ignore this minor version` will close this PR and stop
Dependabot creating any more for this minor version (unless you reopen
the PR or upgrade to it yourself)
- `@dependabot ignore this dependency` will close this PR and stop
Dependabot creating any more for this dependency (unless you reopen the
PR or upgrade to it yourself)


</details>

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Co-authored-by: blackmwk <liurenjie1024@outlook.com>

* chore(deps): Bump datafusion-cli from 52.2.0 to 52.3.0 (#2272)

* chore(deps): Bump datafusion-sqllogictest from 52.2.0 to 52.3.0 (#2270)

* fix: explicitly set Python interpreter in maturin build to prevent using wrong version (#2277)

* chore(deps): Bump rustls-webpki from 0.103.7 to 0.103.10 in bindings/python (#2278)

Addresses the security advisory GHSA-pwjx-qhcg-rvj4 for rustls-webpki <
0.103.10 in the Python bindings lockfile.

This is a rebase of #2268 onto main which already includes the root
Cargo.lock audit fix from #2274 (aws-lc-sys >= 0.39.0).


## Which issue does this PR close?



- Closes #.

## What changes are included in this PR?


## Are these changes tested?

ci.

* chore(deps): Bump bytes from 1.11.0 to 1.11.1 in /bindings/python (#2281)

Bumps [bytes](https://github.com/tokio-rs/bytes) from 1.11.0 to 1.11.1.
<details>
<summary>Release notes</summary>
<p><em>Sourced from <a
href="https://github.com/tokio-rs/bytes/releases">bytes's
releases</a>.</em></p>
<blockquote>
<h2>Bytes v1.11.1</h2>
<h1>1.11.1 (February 3rd, 2026)</h1>
<ul>
<li>Fix integer overflow in <code>BytesMut::reserve</code></li>
</ul>
</blockquote>
</details>
<details>
<summary>Changelog</summary>
<p><em>Sourced from <a
href="https://github.com/tokio-rs/bytes/blob/master/CHANGELOG.md">bytes's
changelog</a>.</em></p>
<blockquote>
<h1>1.11.1 (February 3rd, 2026)</h1>
<ul>
<li>Fix integer overflow in <code>BytesMut::reserve</code></li>
</ul>
</blockquote>
</details>
<details>
<summary>Commits</summary>
<ul>
<li><a
href="https://github.com/tokio-rs/bytes/commit/417dccdeff249e0c011327de7d92e0d6fbe7cc43"><code>417dccd</code></a>
Release bytes v1.11.1 (<a
href="https://redirect.github.com/tokio-rs/bytes/issues/820">#820</a>)</li>
<li><a
href="https://github.com/tokio-rs/bytes/commit/d0293b0e35838123c51ca5dfdf468ecafee4398f"><code>d0293b0</code></a>
Merge commit from fork</li>
<li>See full diff in <a
href="https://github.com/tokio-rs/bytes/compare/v1.11.0...v1.11.1">compare
view</a></li>
</ul>
</details>
<br />


[![Dependabot compatibility
score](https://dependabot-badges.githubapp.com/badges/compatibility_score?dependency-name=bytes&package-manager=cargo&previous-version=1.11.0&new-version=1.11.1)](https://docs.github.com/en/github/managing-security-vulnerabilities/about-dependabot-security-updates#about-compatibility-scores)

Dependabot will resolve any conflicts with this PR as long as you don't
alter it yourself. You can also trigger a rebase manually by commenting
`@dependabot rebase`.

[//]: # (dependabot-automerge-start)
[//]: # (dependabot-automerge-end)

---

<details>
<summary>Dependabot commands and options</summary>
<br />

You can trigger Dependabot actions by commenting on this PR:
- `@dependabot rebase` will rebase this PR
- `@dependabot recreate` will recreate this PR, overwriting any edits
that have been made to it
- `@dependabot show <dependency name> ignore conditions` will show all
of the ignore conditions of the specified dependency
- `@dependabot ignore this major version` will close this PR and stop
Dependabot creating any more for this major version (unless you reopen
the PR or upgrade to it yourself)
- `@dependabot ignore this minor version` will close this PR and stop
Dependabot creating any more for this minor version (unless you reopen
the PR or upgrade to it yourself)
- `@dependabot ignore this dependency` will close this PR and stop
Dependabot creating any more for this dependency (unless you reopen the
PR or upgrade to it yourself)
You can disable automated security fix PRs for this repo from the
[Security Alerts
page](https://github.com/apache/iceberg-rust/network/alerts).

</details>

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>

* chore(deps): Bump time from 0.3.44 to 0.3.47 in /bindings/python (#2282)

Bumps [time](https://github.com/time-rs/time) from 0.3.44 to 0.3.47.
<details>
<summary>Release notes</summary>
<p><em>Sourced from <a
href="https://github.com/time-rs/time/releases">time's
releases</a>.</em></p>
<blockquote>
<h2>v0.3.47</h2>
<p>See the <a
href="https://github.com/time-rs/time/blob/main/CHANGELOG.md">changelog</a>
for details.</p>
<h2>v0.3.46</h2>
<p>See the <a
href="https://github.com/time-rs/time/blob/main/CHANGELOG.md">changelog</a>
for details.</p>
<h2>v0.3.45</h2>
<p>See the <a
href="https://github.com/time-rs/time/blob/main/CHANGELOG.md">changelog</a>
for details.</p>
</blockquote>
</details>
<details>
<summary>Changelog</summary>
<p><em>Sourced from <a
href="https://github.com/time-rs/time/blob/main/CHANGELOG.md">time's
changelog</a>.</em></p>
<blockquote>
<h2>0.3.47 [2026-02-05]</h2>
<h3>Security</h3>
<ul>
<li>
<p>The possibility of a stack exhaustion denial of service attack when
parsing RFC 2822 has been
eliminated. Previously, it was possible to craft input that would cause
unbounded recursion. Now,
the depth of the recursion is tracked, causing an error to be returned
if it exceeds a reasonable
limit.</p>
<p>This attack vector requires parsing user-provided input, with any
type, using the RFC 2822 format.</p>
</li>
</ul>
<h3>Compatibility</h3>
<ul>
<li>Attempting to format a value with a well-known format (i.e. RFC
3339, RFC 2822, or ISO 8601) will
error at compile time if the type being formatted does not provide
sufficient information. This
would previously fail at runtime. Similarly, attempting to format a
value with ISO 8601 that is
only configured for parsing (i.e. <code>Iso8601::PARSING</code>) will
error at compile time.</li>
</ul>
<h3>Added</h3>
<ul>
<li>Builder methods for format description modifiers, eliminating the
need for verbose initialization
when done manually.</li>
<li><code>date!(2026-W01-2)</code> is now supported. Previously, a space
was required between <code>W</code> and <code>01</code>.</li>
<li><code>[end]</code> now has a <code>trailing_input</code> modifier
which can either be <code>prohibit</code> (the default) or
<code>discard</code>. When it is <code>discard</code>, all remaining
input is ignored. Note that if there are components
after <code>[end]</code>, they will still attempt to be parsed, likely
resulting in an error.</li>
</ul>
<h3>Changed</h3>
<ul>
<li>More performance gains when parsing.</li>
</ul>
<h3>Fixed</h3>
<ul>
<li>If manually formatting a value, the number of bytes written was one
short for some components.
This has been fixed such that the number of bytes written is always
correct.</li>
<li>The possibility of integer overflow when parsing an owned format
description has been effectively
eliminated. This would previously wrap when overflow checks were
disabled. Instead of storing the
depth as <code>u8</code>, it is stored as <code>u32</code>. This would
require multiple gigabytes of nested input to
overflow, at which point we've got other problems and trivial
mitigations are available by
downstream users.</li>
</ul>
<h2>0.3.46 [2026-01-23]</h2>
<h3>Added</h3>
<ul>
<li>All possible panics are now documented for the relevant
methods.</li>
<li>The need to use <code>#[serde(default)]</code> when using custom
<code>serde</code> formats is documented. This applies
only when deserializing an <code>Option&lt;T&gt;</code>.</li>
<li><code>Duration::nanoseconds_i128</code> has been made public,
mirroring
<code>std::time::Duration::from_nanos_u128</code>.</li>
</ul>
<!-- raw HTML omitted -->
</blockquote>
<p>... (truncated)</p>
</details>
<details>
<summary>Commits</summary>
<ul>
<li><a
href="https://github.com/time-rs/time/commit/d5144cd2874862d46466c900910cd8577d066019"><code>d5144cd</code></a>
v0.3.47 release</li>
<li><a
href="https://github.com/time-rs/time/commit/f6206b050fd54817d8872834b4d61f605570e89b"><code>f6206b0</code></a>
Guard against integer overflow in release mode</li>
<li><a
href="https://github.com/time-rs/time/commit/1c63dc7985b8fa26bd8c689423cc56b7a03841ee"><code>1c63dc7</code></a>
Avoid denial of service when parsing Rfc2822</li>
<li><a
href="https://github.com/time-rs/time/commit/5940df6e72efb63d246ca1ca59a0f836ad32ad8a"><code>5940df6</code></a>
Add builder methods to avoid verbose construction</li>
<li><a
href="https://github.com/time-rs/time/commit/00881a4da1bc5a6cb6313052e5017dbd7daa40f0"><code>00881a4</code></a>
Manually format macros everywhere</li>
<li><a
href="https://github.com/time-rs/time/commit/bb723b6d826e46c174d75cd08987061984b0ceb7"><code>bb723b6</code></a>
Add <code>trailing_input</code> modifier to <code>end</code></li>
<li><a
href="https://github.com/time-rs/time/commit/31c4f8e0b56e6ae24fe0d6ef0e492b6741dda783"><code>31c4f8e</code></a>
Permit <code>W12</code> in <code>date!</code> macro</li>
<li><a
href="https://github.com/time-rs/time/commit/490a17bf306576850f33a86d3ca95d96db7b1dcd"><code>490a17b</code></a>
Mark error paths in well-known formats as cold</li>
<li><a
href="https://github.com/time-rs/time/commit/6cb1896a600be1538ecfab8f233fe9cfe9fa8951"><code>6cb1896</code></a>
Optimize <code>Rfc2822</code> parsing</li>
<li><a
href="https://github.com/time-rs/time/commit/6d264d59c25e3da0453c3defebf4640b0086a006"><code>6d264d5</code></a>
Remove erroneous <code>#[inline(never)]</code> attributes</li>
<li>Additional commits viewable in <a
href="https://github.com/time-rs/time/compare/v0.3.44...v0.3.47">compare
view</a></li>
</ul>
</details>
<br />


[![Dependabot compatibility
score](https://dependabot-badges.githubapp.com/badges/compatibility_score?dependency-name=time&package-manager=cargo&previous-version=0.3.44&new-version=0.3.47)](https://docs.github.com/en/github/managing-security-vulnerabilities/about-dependabot-security-updates#about-compatibility-scores)

Dependabot will resolve any conflicts with this PR as long as you don't
alter it yourself. You can also trigger a rebase manually by commenting
`@dependabot rebase`.

[//]: # (dependabot-automerge-start)
[//]: # (dependabot-automerge-end)

---

<details>
<summary>Dependabot commands and options</summary>
<br />

You can trigger Dependabot actions by commenting on this PR:
- `@dependabot rebase` will rebase this PR
- `@dependabot recreate` will recreate this PR, overwriting any edits
that have been made to it
- `@dependabot show <dependency name> ignore conditions` will show all
of the ignore conditions of the specified dependency
- `@dependabot ignore this major version` will close this PR and stop
Dependabot creating any more for this major version (unless you reopen
the PR or upgrade to it yourself)
- `@dependabot ignore this minor version` will close this PR and stop
Dependabot creating any more for this minor version (unless you reopen
the PR or upgrade to it yourself)
- `@dependabot ignore this dependency` will close this PR and stop
Dependabot creating any more for this dependency (unless you reopen the
PR or upgrade to it yourself)
You can disable automated security fix PRs for this repo from the
[Security Alerts
page](https://github.com/apache/iceberg-rust/network/alerts).

</details>

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>

* docs: Add DataFusion Comet to Users section of README (#2283)

## Which issue does this PR close?

<!--
We generally require a GitHub issue to be filed for all bug fixes and
enhancements and this helps us generate change logs for our releases.
You can link an issue to this PR using the GitHub syntax. For example
`Closes #123` indicates that this PR will close issue #123.
-->

- N/A.

## What changes are included in this PR?

<!--
Provide a summary of the modifications in this PR. List the main changes
such as new features, bug fixes, refactoring, or any other updates.
-->

- Add DataFusion Comet to the list of users with a description.

## Are these changes tested?

<!--
Specify what test covers (unit test, integration test, etc.).

If tests are not included in your PR, please explain why (for example,
are they covered by existing tests)?
-->

- N/A.

* feat(encryption) [1/N] Support encryption: Add crypto for AES-GCM (#2026)

Add Core Encryption Primitives for Iceberg Encryption Support.

Part of https://github.com/apache/iceberg-rust/issues/2034

## Summary

This PR introduces the foundational cryptographic primitives needed for
implementing encryption in iceberg-rust, providing AES-GCM encryption
operations that match the Java implementation's behavior and data
format.

 ## Motivation

Iceberg's Java implementation supports table-level encryption to protect
sensitive data at rest. To achieve feature parity and ensure
interoperability between Java and Rust implementations, we need to build
encryption support from the ground up. This PR provides the core
cryptographic operations that will serve as the foundation for the
complete encryption feature.

 ## Changes

  New Module: encryption

Added a new encryption module with core AES-GCM cryptographic
operations:

  - encryption/crypto.rs - Core encryption implementation
- EncryptionAlgorithm enum supporting AES-128-GCM as this is the only
algorithm currently supported in arrow parquet
    - SecureKey struct with automatic memory zeroization for security
- AesGcmEncryptor providing encrypt/decrypt operations with AAD support

  Key Features

1. Java-Compatible Format: Ciphertext format matches Java's
implementation exactly:
  [12-byte nonce][encrypted data][16-byte GCM authentication tag]
1. This ensures files encrypted by Java can be decrypted by Rust and
vice versa.
2. Secure Key Handling: Uses the zeroize crate to automatically clear
encryption keys from memory when dropped, preventing key material from
lingering in memory.
3. Additional Authenticated Data (AAD): Full support for AAD to ensure
integrity of associated metadata that isn't encrypted.
  4. Comprehensive Testing: 8 tests covering:
    - Round-trip encryption/decryption for both AES-128 and AES-256
    - AAD validation
    - Empty plaintext handling
    - Tamper detection
    - Format compatibility verification

  Dependencies Added

  - aes-gcm = "0.10" - Industry-standard AES-GCM implementation
  - zeroize = "1.7" - Secure memory cleanup for encryption keys

  Compatibility

This implementation directly corresponds to Java's
https://github.com/apache/iceberg/blob/main/core/src/main/java/org/apache/iceberg/encryption/Ciphers.java:

| Java Class | Rust Implementation |

|-----------------------------|------------------------------------------|
| Ciphers.AesGcmEncryptor | AesGcmEncryptor::encrypt() |
| Ciphers.AesGcmDecryptor | AesGcmEncryptor::decrypt() |
  | EncryptionAlgorithm.AES_GCM | EncryptionAlgorithm::Aes128Gcm|

  Testing

  Future Work

This PR is the first in a series to implement full encryption support.
Upcoming PRs will add:

  1. Table properties for encryption configuration
  2. Key management interfaces (KeyManagementClient trait)
  3. EncryptionManager implementation
  4. Native Parquet encryption integration
  5. AWS KMS support
  6. Integration with Table and FileIO

  Review Notes

  - This PR is intentionally minimal and self-contained
  - No existing code paths are modified - this is purely additive
  - The module is public but won't be used until future PRs wire it up
- Format compatibility with Java has been prioritized to ensure
interoperability


## Which issue does this PR close?

<!--
We generally require a GitHub issue to be filed for all bug fixes and
enhancements and this helps us generate change logs for our releases.
You can link an issue to this PR using the GitHub syntax. For example
`Closes #123` indicates that this PR will close issue #123.
-->

- Closes #. https://github.com/apache/iceberg-rust/issues/2035

## What changes are included in this PR?

<!--
Provide a summary of the modifications in this PR. List the main changes
such as new features, bug fixes, refactoring, or any other updates.
-->

## Are these changes tested?
Yes
<!--
Specify what test covers (unit test, integration test, etc.).

If tests are not included in your PR, please explain why (for example,
are they covered by existing tests)?
-->

* feat!(catalog): adding support for purge_table (#2232)

## Which issue does this PR close?

<!--
We generally require a GitHub issue to be filed for all bug fixes and
enhancements and this helps us generate change logs for our releases.
You can link an issue to this PR using the GitHub syntax. For example
`Closes #123` indicates that this PR will close issue #123.
-->

- Closes #2133 

## What changes are included in this PR?
- Add catalog/utils.rs to provide helpers to delete table data using
file_io and table_metadata
- Add new API `purge_table` to `Catalog` trait and add default
implementation
- Implement purge_table for S3TableCatalog and RestCatalog

<!--
Provide a summary of the modifications in this PR. List the main changes
such as new features, bug fixes, refactoring, or any other updates.
-->

## Are these changes tested?
Added new tests in table_suite
<!--
Specify what test covers (unit test, integration test, etc.).

If tests are not included in your PR, please explain why (for example,
are they covered by existing tests)?
-->

* deps: upgrade DataFusion to 53.0, Arrow to 58 (#2206)

## Which issue does this PR close?

- Closes #.
 
## What changes are included in this PR?
                                                          
- Bump DataFusion to 53.0.0, Arrow/Parquet to 58, sqllogictest to 0.29,
pyo3 to 0.28.
- Adapt to DataFusion 53 API changes in physical plan executors and
python bindings.
- Update SLT expected test output.

## Are these changes tested?

Existing tests.

---------

Co-authored-by: Xander <zander181@googlemail.com>

* chore(deps): Bump uuid from 1.22.0 to 1.23.0 (#2291)

Bumps [uuid](https://github.com/uuid-rs/uuid) from 1.22.0 to 1.23.0.
<details>
<summary>Release notes</summary>
<p><em>Sourced from <a
href="https://github.com/uuid-rs/uuid/releases">uuid's
releases</a>.</em></p>
<blockquote>
<h2>v1.23.0</h2>
<h2>What's Changed</h2>
<ul>
<li>feat: add support for 'hyphenated' format in the serde module by <a
href="https://github.com/FrenchDilettante"><code>@​FrenchDilettante</code></a>
in <a
href="https://redirect.github.com/uuid-rs/uuid/pull/865">uuid-rs/uuid#865</a></li>
<li>Fix a number of bugs in time-related code by <a
href="https://github.com/KodrAus"><code>@​KodrAus</code></a> in <a
href="https://redirect.github.com/uuid-rs/uuid/pull/872">uuid-rs/uuid#872</a></li>
<li>Reword invalid char error message by <a
href="https://github.com/KodrAus"><code>@​KodrAus</code></a> in <a
href="https://redirect.github.com/uuid-rs/uuid/pull/873">uuid-rs/uuid#873</a></li>
<li>Impl cleanups by <a
href="https://github.com/KodrAus"><code>@​KodrAus</code></a> in <a
href="https://redirect.github.com/uuid-rs/uuid/pull/874">uuid-rs/uuid#874</a></li>
<li>Use LazyLock to synchronize v1/v6 context initialization by <a
href="https://github.com/KodrAus"><code>@​KodrAus</code></a> in <a
href="https://redirect.github.com/uuid-rs/uuid/pull/875">uuid-rs/uuid#875</a></li>
<li>Prepare for 1.23.0 release by <a
href="https://github.com/KodrAus"><code>@​KodrAus</code></a> in <a
href="https://redirect.github.com/uuid-rs/uuid/pull/876">uuid-rs/uuid#876</a></li>
</ul>
<h2>New Contributors</h2>
<ul>
<li><a
href="https://github.com/FrenchDilettante"><code>@​FrenchDilettante</code></a>
made their first contribution in <a
href="https://redirect.github.com/uuid-rs/uuid/pull/865">uuid-rs/uuid#865</a></li>
</ul>
<h2>Special thanks</h2>
<p><a href="https://github.com/meng-xu-cs"><code>@​meng-xu-cs</code></a>
raised a series of bugs against the timestamp logic in <code>uuid</code>
using automated tooling. The issues themselves were reasonably and
responsibly presented and the end result is a better <code>uuid</code>
library for everyone. Thanks!</p>
<h1>Deprecations</h1>
<p>This release includes the following deprecations:</p>
<ul>
<li><code>Context</code>: Renamed to <code>ContextV1</code></li>
<li><code>Timestamp::from_gregorian</code>: Renamed to
<code>Timestamp::from_gregorian_time</code></li>
</ul>
<h1>Change to <code>Version::Max</code></h1>
<p><code>Version::Max</code>'s <code>u8</code> representation has
changed from <code>0xff</code> to <code>0x0f</code> to match the value
returned by <code>Uuid::get_version_num</code>.</p>
<h1>Change to <code>Uuid::get_version</code> for the max UUID</h1>
<p><code>Uuid::get_version</code> will only return
<code>Some(Version::Max)</code> if the UUID is actually the max UUID
(all bytes are <code>0xff</code>). Previously it would return
<code>Some</code> if only the version field was <code>0x0f</code>. This
change matches the behaviour of the nil UUID, which only returns
<code>Some(Version::Nil)</code> if the UUID is the nil UUID (all bytes
are <code>0x00</code>).</p>
<p><strong>Full Changelog</strong>: <a
href="https://github.com/uuid-rs/uuid/compare/v1.22.0...v1.23.0">https://github.com/uuid-rs/uuid/compare/v1.22.0...v1.23.0</a></p>
</blockquote>
</details>
<details>
<summary>Commits</summary>
<ul>
<li><a
href="https://github.com/uuid-rs/uuid/commit/00ab922d5351607dfff520f37eb49cb9854fda73"><code>00ab922</code></a>
Merge pull request <a
href="https://redirect.github.com/uuid-rs/uuid/issues/876">#876</a> from
uuid-rs/cargo/v1.23.0</li>
<li><a
href="https://github.com/uuid-rs/uuid/commit/726ba45fe3491bf6253173d0be6b99ed3b1cbbb9"><code>726ba45</code></a>
prepare for 1.23.0 release</li>
<li><a
href="https://github.com/uuid-rs/uuid/commit/996dadea029e3976f52cba58e5e9b9a08c4f82c4"><code>996dade</code></a>
Merge pull request <a
href="https://redirect.github.com/uuid-rs/uuid/issues/875">#875</a> from
uuid-rs/fix/context-ordering</li>
<li><a
href="https://github.com/uuid-rs/uuid/commit/e14047993bc5a6180a96119436a983c19d79b084"><code>e140479</code></a>
simplify a use stmt</li>
<li><a
href="https://github.com/uuid-rs/uuid/commit/8ed9142847a22bc7707794bfee6b2016d4470772"><code>8ed9142</code></a>
reorganize and document more v7 context internals</li>
<li><a
href="https://github.com/uuid-rs/uuid/commit/e09a3225a8d99c5eadcbbeb7432195b2ea5ece76"><code>e09a322</code></a>
use LazyLock to synchronize v1/v6 context initialization</li>
<li><a
href="https://github.com/uuid-rs/uuid/commit/0f260cc67135ac20d914e387a47e59960247fdee"><code>0f260cc</code></a>
Merge pull request <a
href="https://redirect.github.com/uuid-rs/uuid/issues/874">#874</a> from
uuid-rs/chore/impl-cleanups</li>
<li><a
href="https://github.com/uuid-rs/uuid/commit/1419e91097fcffc7afa8f54eb41fdc912200b540"><code>1419e91</code></a>
clean up and refactor main lib tests</li>
<li><a
href="https://github.com/uuid-rs/uuid/commit/ceeaf4b7b59895497c59acdaf286233b1e7cc576"><code>ceeaf4b</code></a>
ensure we don't overflow on counters less than 12</li>
<li><a
href="https://github.com/uuid-rs/uuid/commit/63bc8f52e5042b9c729fa0380b9948b49fe397cc"><code>63bc8f5</code></a>
Merge pull request <a
href="https://redirect.github.com/uuid-rs/uuid/issues/873">#873</a> from
uuid-rs/fix/error-msg</li>
<li>Additional commits viewable in <a
href="https://github.com/uuid-rs/uuid/compare/v1.22.0...v1.23.0">compare
view</a></li>
</ul>
</details>
<br />


[![Dependabot compatibility
score](https://dependabot-badges.githubapp.com/badges/compatibility_score?dependency-name=uuid&package-manager=cargo&previous-version=1.22.0&new-version=1.23.0)](https://docs.github.com/en/github/managing-security-vulnerabilities/about-dependabot-security-updates#about-compatibility-scores)

Dependabot will resolve any conflicts with this PR as long as you don't
alter it yourself. You can also trigger a rebase manually by commenting
`@dependabot rebase`.

[//]: # (dependabot-automerge-start)
[//]: # (dependabot-automerge-end)

---

<details>
<summary>Dependabot commands and options</summary>
<br />

You can trigger Dependabot actions by commenting on this PR:
- `@dependabot rebase` will rebase this PR
- `@dependabot recreate` will recreate this PR, overwriting any edits
that have been made to it
- `@dependabot show <dependency name> ignore conditions` will show all
of the ignore conditions of the specified dependency
- `@dependabot ignore this major version` will close this PR and stop
Dependabot creating any more for this major version (unless you reopen
the PR or upgrade to it yourself)
- `@dependabot ignore this minor version` will close this PR and stop
Dependabot creating any more for this minor version (unless you reopen
the PR or upgrade to it yourself)
- `@dependabot ignore this dependency` will close this PR and stop
Dependabot creating any more for this dependency (unless you reopen the
PR or upgrade to it yourself)


</details>

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>

* ci: improve github workflows (#2289)

## Which issue does this PR close?

<!--
We generally require a GitHub issue to be filed for all bug fixes and
enhancements and this helps us generate change logs for our releases.
You can link an issue to this PR using the GitHub syntax. For example
`Closes #123` indicates that this PR will close issue #123.
-->

- Closes #.

## What changes are included in this PR?
Relates to https://github.com/apache/iceberg/issues/15742

This PR 
- Add "ASF allowlist check" 
- Pin commit for codeql.yml (zizmor recommended)
- Add back Github Action auto-update for dependabot (reverts #2267) 
- Add cooldown to dependabot (zizmor recommended)
- `Swatinem/rust-cache@v2` -> `swatinem/rust-cache@v2` (fix case
sensitivity) [asf infra allowlist uses
lowercase](https://github.com/apache/infrastructure-actions/blob/fae466bc0d9821859a623cbc7648c750ff359ec6/approved_patterns.yml#L271)

We can add back dependabot for github action because the "ASF allowlist
check" will now alert when an action is not allowed (failures will no
longer be silent)

<!--
Provide a summary of the modifications in this PR. List the main changes
such as new features, bug fixes, refactoring, or any other updates.
-->

## Are these changes tested?

<!--
Specify what test covers (unit test, integration test, etc.).

If tests are not included in your PR, please explain why (for example,
are they covered by existing tests)?
-->

* Make `convert_filters_to_predicate` public (#2118)

## What changes are included in this PR?

- Make `convert_filters_to_predicate` public in the DataFusion
integration to allow external usage of the filter conversion logic.

## Are these changes tested?

- This is a visibility change (`pub use`) and does not introduce new
logic.

Co-authored-by: Denis Semenov <d.s.semenov@vkteam.ru>

* ci: fix zizmor security f…
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants