dimas-b commented on code in PR #3330:
URL: https://github.com/apache/polaris/pull/3330#discussion_r2651315257
##########
client/python/apache_polaris/cli/constants.py:
##########
@@ -258,6 +260,12 @@ class Create:
"(Only for S3) Indicates that Polaris should not use STS (e.g.
if STS is not available)"
)
PATH_STYLE_ACCESS = "(Only for S3) Whether to use
path-style-access for S3"
+ KMS_KEY_CURRENT = (
+ "(Only for AWS S3) The AWS KMS key ARN to be used for
encrypting new S3 data"
Review Comment:
Polaris does not use KMS keys directly. It only generates AWS policies that
allow those keys to be used on the AWS side when S3 requests are made. But,
yes, the current key is used for writing new data. Zero or more additional keys
are also allowed to be used because they might be required for dealing with old
files.
--
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.
To unsubscribe, e-mail: [email protected]
For queries about this service, please contact Infrastructure at:
[email protected]