gcp: skip potentially dangerous kms_crypto/kms_key_ring_iam_policy/binding
#12
Labels
enhancement
New feature or request
kms_crypto/kms_key_ring_iam_policy/binding
#12
What problem are you facing?
Provider Name: provider-gcp
Provider Version:
Moved from https://github.com/upbound/official-providers/issues/446
google_kms_crypto_key_iam_policy
google_kms_crypto_key_iam_binding
google_kms_key_ring_iam_policy
google_kms_key_ring_iam_binding
The above resources are a powerful mechanism and similarly to
iam
roles it can lead to cluster-wide outage (see example: https://upboundio.slack.com/archives/C013YNJ423Y/p1659622122579009).https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/google_kms_crypto_key_iam
https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/google_kms_key_ring_iam
More details and discussion about the dangers of using those resources can be found here: #14
How could Official Providers help solve your problem?
The suggestion is not to implement those, but use
google_kms_crypto_key_iam_member
andgoogle_kms_key_ring_iam_member
exclusively. Similar decision has been made in the platform team regarding the usage of otheriam
resources.The text was updated successfully, but these errors were encountered: