-
Notifications
You must be signed in to change notification settings - Fork 9.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Feature request: New S3 encryption support #2217
Comments
See also:
There's an open issue for S3 Inventory support: |
Just checked the AWS go SDK, don't see the PUT Bucket Encryption API is there yet. It's in Python SDK for the obvious reason. Related to aws/aws-sdk-go#1638 Updated: it's in the latest Go SDK. What missing is the documentation |
Proposal: Reference: http://docs.aws.amazon.com/AmazonS3/latest/API/RESTBucketPUTencryption.html Couple of places to change:
|
…e encryption configuration
* hashicorp#2217: get default encryption configuration for s3 bucket data source * hashicorp#2217: added acceptance test for basic case * hashicorp#2217: documentation
* hashicorp#2217: updated r/aws_s3_bucket to support default server side encryption configuration * hashicorp#2217: make fmt
* hashicorp#2217: get default encryption configuration for s3 bucket data source * hashicorp#2217: added acceptance test for basic case * hashicorp#2217: documentation
* hashicorp#2217: get default encryption configuration for s3 bucket data source * hashicorp#2217: added acceptance test for basic case * hashicorp#2217: documentation
* Makefile: Add sweep target * Add more example and missing field * docs/elasticache_replication_group: Add missing fields * Update CHANGELOG.md * r/aws_dynamodb_table: Ensure ttl is properly read (hashicorp#2452) * r/aws_dynamodb_table: Ensure ttl is properly read * r/aws_dynamodb_table: hashicorp#2452 review updates * Add timeToLiveOutput.TimeToLiveDescription nil check * Simplify logic to d.Set ttl * Update CHANGELOG.md * Bump aws-sdk-go to v.1.12.45 * New Resource: PublicDnsNamespace (hashicorp#2569) * WIP * Add test, docs * Reflect reviews * Modify error handling * Update CHANGELOG.md * New Resource: ServiceDiscovery PrivateDNS Namespace (hashicorp#2589) * New Resource: service_discovery_private_dns_namespace * Reflect reviews * Update CHANGELOG.md * hashicorp#2217: re-enable default encryption after disabling in via UI * hashicorp#2217: documentation
* master: (147 commits) Cleaned Data Sources Update CHANGELOG.md resource/cognito_user_pool: Update Cognito email message length to 20,000 (#2692) Update ecs_service.html.markdown (#2694) Documentation: r/ecs_task_definition note about quote escaping container_definition (#2162) Cleanup after v1.6.0 release v1.6.0 Make depends_on consistent with note (#2526) removing duplicate Update CHANGELOG.md r/aws_ssm_parameter: Fix arn attribute for full path names and improve testing Update CHANGELOG.md Update CHANGELOG.md s3: Add validation for SSE Algorithm and correct spelling #2217: fixed when encryption is AES256 #2217: documentation #2217: re-enable default encryption after disabling in via UI #2217: wrote additional acceptance test #2217: wrote typical acceptance test #2217: make fmt ...
I think this is addressed by #2472 - if anyone feels that there is missing functionality please comment here! |
In case this helps anyone, this means that |
Hi jen20, I would like to add this SSE feature to a custom terraform module that we have used to create all our s3 buckets. |
Sorry for the confusion, |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. Thanks! |
This issue was originally opened by @wayneclancy as hashicorp/terraform#16591. It was migrated here as a result of the provider split. The original body of the issue is below.
Is there any chance we can add support for the new range of AWS S3 server side encryption features?
https://aws.amazon.com/blogs/aws/new-amazon-s3-encryption-security-features/
The text was updated successfully, but these errors were encountered: