-
Notifications
You must be signed in to change notification settings - Fork 281
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
Non default master key Server Side Encryption KMS support #235
Comments
Sounds like this would make for a sensible default, along with creating a dedicated key in the cloudformation stack. I wonder what the behaviour of changing the KMS key associated with already SSE encrypted files is. |
Just my 2 cents worth. I think S3 default master key encryption as it is implemented today makes for a sensible default, the additional ability to specify as a parameter the arn of a kms key to the CF template for the stack would be slick. |
Yup, on reflection, I agree. |
Hi, How can i overcome this issue? pls help me with this. |
@ReshuS I believe you need to specify: |
@gugahoi ya, Thank you! Its working now... :-) |
When I am running this command facing following error: |
I hate to ask, but you're using your bucket name, not |
yah that is right. that is just for reference. |
Do you have permission to write to that bucket?
…Sent from my iPhone
On 8 Sep 2017, at 5:31 pm, sushilvarma2 ***@***.***> wrote:
yah that is right. that is just for reference.
—
You are receiving this because you commented.
Reply to this email directly, view it on GitHub, or mute the thread.
|
Yah, I assigned S3, KMS role to the user. It works without any issue when I am using default KMS ID and not even providing kms id. Just simple copy to S3 bucket. I have also used this option, as advised in aws documentation. I have tried both these policies also to the bucket but no help: { |
This issue got resolved by adding user into "key users" section in encryption key. Earlier I have added this user only into "Key Administrator" section. Thanks everyone. |
Thanks a lot everyone, I had been breaking my head since yesterday, found this post, it worked. |
Currently the buildkite agent KMS support is limited to (as per the environment script)
which ends up employing the default master key for the S3 service, i.e. the key that is used to encrypt S3 objects when no other key is defined.
It would be ideal to make use of an explicit kms key id issued exclusively for buildkite agent purposes. Something like
where the arn for the key could be passed in as a parameter to the Cloudformation template for the stack.
The text was updated successfully, but these errors were encountered: