singhpk234 commented on code in PR #3330:
URL: https://github.com/apache/polaris/pull/3330#discussion_r2651545555


##########
client/python/apache_polaris/cli/constants.py:
##########
@@ -258,6 +260,12 @@ class Create:
                 "(Only for S3) Indicates that Polaris should not use STS (e.g. 
if STS is not available)"
             )
             PATH_STYLE_ACCESS = "(Only for S3) Whether to use 
path-style-access for S3"
+            KMS_KEY_CURRENT = (
+                "(Only for AWS S3) The AWS KMS key ARN to be used for 
encrypting new S3 data"

Review Comment:
   > Polaris does not use KMS keys directly.
   
   wouldn't we be needing this for encrypting / decrypting metadata.json ? 
   
   
   > additional keys are also allowed to be used because they might be required 
for dealing with old files
   
   I agree with additional keys but my question was why would Polaris vends 
creds for old kms keys for encrypting, files are immutable, so old keys should 
be vended for decrypt, similarly new key should have encrypt / decrypt. 
   Do we vend creds for encryption and decryting for all key in our sts policy 
? 
   



-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: [email protected]

For queries about this service, please contact Infrastructure at:
[email protected]

Reply via email to