Matthew Clarke created NIFI-3645:
------------------------------------
Summary: Add aws:kms, sse-c, sse-c-key, and sse-kms-key-id
capability to server side encryption in the PutS3Object processor.
Key: NIFI-3645
URL: https://issues.apache.org/jira/browse/NIFI-3645
Project: Apache NiFi
Issue Type: Improvement
Affects Versions: 1.1.0
Reporter: Matthew Clarke
Server Side Encryption (sse) currently exists in the PutS3Object processor but
don’t see sse-c, sse-c-key or sse-kms-key-id options.
--sse (string) Specifies server-side encryption of the object in S3. Valid
values are AES256 and aws:kms. If the parameter is specified but no value is
provided, AES256 is used.
--sse-c (string) Specifies server-side encryption using customer provided keys
of the the object in S3. AES256 is the only valid value. If the parameter is
specified but no value is provided, AES256 is used. If you provide this value,
--sse-c-key must be specified as well.
--sse-c-key (string) The customer-provided encryption key to use to server-side
encrypt the object in S3. If you provide this value, --sse-c must be specified
as well. The key provided should not be base64 encoded.
--sse-kms-key-id (string) The AWS KMS key ID that should be used to server-side
encrypt the object in S3. Note that you should only provide this parameter if
KMS key ID is different the default S3 master KMS key.
Would like to see full support of the various server side encryption
capabilities added to our S3 processors.
This is related partially to another Apache Jira: NIFI-1769
--
This message was sent by Atlassian JIRA
(v6.3.15#6346)