serverless-apigateway-service-proxy
serverless-apigateway-service-proxy copied to clipboard
Support server-side encryption for Kinesis stream
If we enabled server-side encryption in Kinesis resource, the compiled IAM policy has not sufficient rights to do the putRecord(s), result in "__type": "KMSAccessDeniedException", "message": "User: arn:aws:sts::xxxxxxxxx:assumed-role/xxxxxxxxxxxxx is not authorized to perform: kms:GenerateDataKey on resource: arn:aws:kms:xxxxxxx:xxxxxx:key/xxxxxxxxxxxxxx"
Is the only workaround currently for this to use a custom iam role?