Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feature(kms): Allow Functions to Decrypt Environment Variables #1

Closed

Conversation

chrisoverzero
Copy link
Owner

...If They Have Been Encrypted

When a Function specifies that its environment variables should be
encrypted by supplying a value for KmsKeyArn, a corresponding
Policy will be generated for that Function's execution Role which
allows it to decrypt the environment variables with that key.
Permissions are restricted so that it should be able to do nothing
else with the key.

Issue #, if available:

aws#1989

Description of changes:

Description of how you validated changes:

Ran all unit tests and compared generated policy to manually written one from other, earlier projects.

Checklist:

  • Write/update tests
  • make pr passes
  • Update documentation
  • Verify transformed template deploys and application functions as expected

Examples?

Please reach out in the comments, if you want to add an example. Examples will be
added to sam init through https://github.com/awslabs/aws-sam-cli-app-templates/

By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license.

...If They Have Been Encrypted

When a Function specifies that its environment variables should be
encrypted by supplying a value for `KmsKeyArn`, a corresponding
Policy will be generated for that Function's execution Role which
allows it to decrypt the environment variables with that key.
Permissions are restricted so that it should be able to do nothing
else with the key.
@chrisoverzero
Copy link
Owner Author

Created for team members to review.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
1 participant