-
Notifications
You must be signed in to change notification settings - Fork 267
Add kmsKeyRef value for Bucket CRD #1649
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
This should be a relatively straightforward thing to add, right @RedbackThomson? |
Issues go stale after 90d of inactivity. |
Stale issues rot after 30d of inactivity. |
Rotten issues close after 30d of inactivity. |
@ack-bot: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
@jaypipes @RedbackThomson Can this be reopened? We have the same use case. |
Hello! Feel free to reach out with any questions :) |
Is your feature request related to a problem?
I'm trying to create a Helm chart to deploy an S3 bucket that follows our company security credentials. For each bucket, we create a dedicated KMS key, but I'm not currently able to do that in a single Helm installation.
The Bucket CRD only has a
encryption/rules/applyServerSideEncryptionByDefault/kmsMasterKeyID
field, and I need to be able to pass akmsKeyRef
object, much like I can when creating a DBInstance object for RDS.Describe the solution you'd like
I'd like the Bucket CRD to support
encryption/rules/applyServerSideEncryptionByDefault/kmsKeyRef
so I can pass in the key object I'm creating.Describe alternatives you've considered
All the examples I can find online depend on using Bash variables to combine k8s manifests with AWS CLI lookups, but I don't have access to these things in an automated, GitOps-based installation process.
The text was updated successfully, but these errors were encountered: