-
`AWS::KMS::Key` supports configuring a resource policy as a property on the object, but not as its own resource. Given that by default, keys must have a statement both in the key resource policy as we…
-
### Terraform Core Version
1.7.3
### AWS Provider Version
4.67.0
### Affected Resource(s)
aws_lambda_function
### Expected Behavior
1) Run terraform plan and apply.
2) Completes successfully a…
-
### Community Note
* Please vote on this issue by adding a 👍 [reaction](https://blog.github.com/2016-03-10-add-reactions-to-pull-requests-issues-and-comments/) to the original issue to help the com…
-
Currently the backup/assume-role roachtest fails on aws every night because the credentials are stale. Instead of trying to maintain proper kms credentials on both the roachtest suite and in the cloud…
-
### Terraform Core Version
1.4.5
### AWS Provider Version
4.63.0
### Affected Resource(s)
* aws_instance
### Expected Behavior
I expect a `terraform apply/plan` to not see changes…
ghost updated
1 month ago
-
**Is your feature request related to a problem? Please describe.**
See #56247. Users of the `aws_kms` renderer reasonably expect that they can use the encrypted text returned by `aws kms encrypt`.…
-
### Describe the issue
According to the V2 migration documentation, (almost) all feature flags were removed and @aws-cdk/aws-kms:defaultKeyPolicies was not an exception.
> Remove all feature flags…
-
**Describe the issue**
I'm seeing false positives for the following checks when called from a module with the terraform `count` attribute.
If no `count` is specified these checks pass. Note: I'm al…
-
### Describe the bug
`cdk import --resource-mapping=resource-mapping.json` doesn't work. This returns
```
Unrecognized resource identifiers in mapping file: ImportedKMSKey1, ImportedKMSKey2
No …
-
Calling secret.grantRead() in another stack on a secret encrypted with KMS would result in cyclic reference error.
### Reproduction Steps
```
#!/usr/bin/env node
import cdk = require("mo…