Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[proposal] Warn google_kms_crypto_key without prevent_destroy #30

Open
wata727 opened this issue Sep 26, 2020 · 0 comments
Open

[proposal] Warn google_kms_crypto_key without prevent_destroy #30

wata727 opened this issue Sep 26, 2020 · 0 comments
Labels
enhancement New feature or request

Comments

@wata727
Copy link
Member

wata727 commented Sep 26, 2020

See https://www.terraform.io/docs/providers/google/r/kms_crypto_key.html

Note: CryptoKeys cannot be deleted from Google Cloud Platform. Destroying a Terraform-managed CryptoKey will remove it from state and delete all CryptoKeyVersions, rendering the key unusable, but will not delete the resource on the server. When Terraform destroys these keys, any data previously encrypted with these keys will be irrecoverable. For this reason, it is strongly recommended that you add lifecycle hooks to the resource to prevent accidental destruction.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Development

No branches or pull requests

1 participant