You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@nifi.apache.org by "Sandish Kumar HN (JIRA)" <ji...@apache.org> on 2019/04/03 05:51:00 UTC

[jira] [Assigned] (NIFI-3645) Add aws:kms, sse-c, sse-c-key, and sse-kms-key-id capability to server side encryption in the PutS3Object processor.

     [ https://issues.apache.org/jira/browse/NIFI-3645?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

Sandish Kumar HN reassigned NIFI-3645:
--------------------------------------

    Assignee: Sandish Kumar HN

> Add aws:kms, sse-c, sse-c-key, and sse-kms-key-id capability to server side encryption in the PutS3Object processor.
> --------------------------------------------------------------------------------------------------------------------
>
>                 Key: NIFI-3645
>                 URL: https://issues.apache.org/jira/browse/NIFI-3645
>             Project: Apache NiFi
>          Issue Type: Improvement
>    Affects Versions: 1.1.0
>            Reporter: Matthew Clarke
>            Assignee: Sandish Kumar HN
>            Priority: Major
>
> Server Side Encryption (sse) currently exists in the PutS3Object processor but don’t see sse-c, sse-c-key or sse-kms-key-id options. 
> --sse (string) Specifies server-side encryption of the object in S3. Valid values are AES256 and aws:kms. If the parameter is specified but no value is provided, AES256 is used. 
> --sse-c (string) Specifies server-side encryption using customer provided keys of the the object in S3. AES256 is the only valid value. If the parameter is specified but no value is provided, AES256 is used. If you provide this value, --sse-c-key must be specified as well. 
> --sse-c-key (string) The customer-provided encryption key to use to server-side encrypt the object in S3. If you provide this value, --sse-c must be specified as well. The key provided should not be base64 encoded. 
> --sse-kms-key-id (string) The AWS KMS key ID that should be used to server-side encrypt the object in S3. Note that you should only provide this parameter if KMS key ID is different the default S3 master KMS key. 
> Would like to see full support of the various server side encryption capabilities added to our S3 processors.
> This is related partially to another Apache Jira: NIFI-1769



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)