-
Notifications
You must be signed in to change notification settings - Fork 925
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Added CMEK for Secret auto managed #1739
Added CMEK for Secret auto managed #1739
Conversation
6b3cc14
to
c2c96ea
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The changes introduced in this PR make the module's use ambiguous. If I understand correctly, you're assuming that if the user specifies a global key, then it will be used for automatic replication.
This opens a few questions:
- How do I enable customer managed replication with a global key?
- How do I disable automatic replication with a global key?
- What happens if the user provides global and regional keys at the same time?
At the very least, I think there should be a way for the user to specify what type of replication to use.
Hi Julio
|
d35c950
to
951488a
Compare
@juliocc Is there anything else I need to do to keep PR going? |
e925217
to
5a1f36d
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Both user_managed replication and auto replication are supported. With this PR, I want to introduce CMEK feature on auto replication. Currently, CMEK can be used only for user_managed replication. |
5a1f36d
to
45106f8
Compare
Replication should be controlled via its own variable, and the CMEK key should be an attribute in it, not a top-level variable. |
So you suggest that the entire logic of this part should be refactored, also the As Is? |
yep, and sorry for doing this in pieces, if we were face to face it would have been a 5m discussion :) I think we should make replication a top-level variable now, and expose auto/user managed/key in its structure I can give it a shot if you like |
@ludoo I tried to implement your suggest by refactoring the logic of secrets variable. |
ac80035
to
4c07268
Compare
d93c31c
to
63f4376
Compare
63f4376
to
871d82c
Compare
ab30f7a
to
06b207d
Compare
Hi @wiktorn, is there anything else I can do for this PR? |
06b207d
to
d0ca5d5
Compare
As discussed, moving forward with this PR
Thank you for your contribution @luigi-bitonti and sorry to keep you waiting. |
Users can choose a custom KMS key for Secret Manager secret replicated automatically.
Checklist
I applicable, I acknowledge that I have:
terraform fmt
on all modified filestools/tfdoc.py