-
When using AWS keys (with the system properties workaround mentioned in #226 ), I have found that when passing the key alias it does not support AWS key aliases, it only supports key IDs. Key alises a…
-
**Is your feature request related to a problem? Please describe.**
The AWS KMS serde currently just serializes the AWS KMS `KeyId` e.g. `1234abcd-12ab-34cd-56ef-1234567890ab` (or `mrk-1234abcd12ab3…
-
I've upgraded our sops binary from v3.8.1 to v3.9.0. Without changing any encrypted file, our pipeline jobs started failing due to this new error. I've put together a few steps to replicate the issue.…
-
### Is your feature request related to a problem? Please describe
We're currently creating regular snapshots of our OpenSearch cluster in an AWS S3 bucket. We have enabled `server_side_encryption`,…
-
I have been trying to setup acceptance tests for aws kms signing but I'm running into,
```
failed to verify certificate: x509: cannot validate certificate
```
error for the localstack endpoint. Di…
-
### Describe the bug
With the following policy:
```
- name: audit-s3-bucket-key-not-enabled
resource: s3
mode:
type: periodic
schedule: "rate(1 day)"
role:
…
-
### Description
This feature was [released](https://aws.amazon.com/blogs/compute/securing-amazon-ecs-workloads-on-aws-fargate-with-customer-managed-keys/) by AWS yesterday, June 10th, 2024. They prov…
-
### Name of the resource
AWS::ECS::Cluster
### Resource Name
_No response_
### Issue Description
When creating a `AWS::ECS::Cluster` in `eu-central-1` using
```yaml
ECSCluster:
…
-
### Terraform Core Version
1.8.5
### AWS Provider Version
>=5.0
### Affected Resource(s)
* aws_s3_bucket_server_side_encryption_configuration
### Expected Behavior
This configurat…
-
### Name of the resource
AWS::ECS::Cluster
### Resource Name
_No response_
### Issue Description
When creating a `AWS::ECS::Cluster` in `eu-central-1` using
```yaml
ECSCluster:
…