Open adamyodinsky opened 1 year ago
@adamyodinsky I think originally the intention behind aws:kms
setting was only to lift signatureVersion
to v4. See this discussion: https://github.com/serverless/serverless/pull/3804/files#r122407453
I'm not deeply familiar with this matter and whether something more should be done
Probably related to AWS adding default encryption on Jan 15th, 2023. Adding a valid KMS Key ID as before won't work anymore
@carlos-delangel so you mean it worked before, and now stopped working because of changes on AWS side?
If that's the case we'll definitely open for PR that improves things
It used to work previously with deploymentBucket under provider set to:
serverSideEncryption: 'aws:kms' kmsKeyID: 'alias'
I tried switching to sseKMSKeyId but it did still not work for me. Ended up moving to use aws-cli for now.
I tried serverSideEncryption: aws:kms and kmsKeyID/sseKMSKeyId . It is not working. I think plugin and serverless versions are not compatible. It worked for me in the past
I'm having the same issue.
As a workaround I'm exporting the bucket name with the serverless-export-outputs plugin and calling aws s3api put-bucket-encryption
in my gitlab ci. A lot of overhead, I hope in a fix for this in the future.
Are you certain it's a bug?
Is the issue caused by a plugin?
Are you using the latest v3 release?
Is there an existing issue for this?
Issue description
I'm having an issue with using KMS for the deployment bucket as described in the documentation under "Deployment bucket".
Getting in the update stack file (cloudformation-template-update-stack.json) with
"SSEAlgorithm": "AES256"
, not kms.Service configuration (serverless.yml) content
Command name and used flags
serverless package, serverless deploy
Command output
Environment information