Bug Description
A custom KMS organization policy bug prevents Terraform from deleting encryption keys.
Environment and Deployment Context
Please provide details about your deployment to help us reproduce the issue.
- Stellar Engine Version/Commit:
main
- Deployment Type:
- FAST Stage (if applicable):
- Affected Component: Custom KMS Org Policy configurations.
- Terraform Version: 1.5.7
- GCP Provider Version: 5.10.0
Steps to Reproduce
Steps to reproduce the behavior:
- Deploy KMS keys under the current custom KMS organization policy.
- Attempt to destroy or delete the keys via Terraform.
- See error related to violating constraints on unsetting rotation periods.
Expected Behavior
Terraform should be able to cleanly delete or manage the lifecycle of KMS keys without Org Policy conflicts.
Actual Behavior
The custom KMS organization policy prevents key deletion, blocking automated teardowns and updates.
Relevant Logs and Errors
N/A
Additional Context
The proposed fix is to modify the custom KMS organization policy or find a workaround to bypass the rotation period constraint during deletion.
Bug Description
A custom KMS organization policy bug prevents Terraform from deleting encryption keys.
Environment and Deployment Context
Please provide details about your deployment to help us reproduce the issue.
mainSteps to Reproduce
Steps to reproduce the behavior:
Expected Behavior
Terraform should be able to cleanly delete or manage the lifecycle of KMS keys without Org Policy conflicts.
Actual Behavior
The custom KMS organization policy prevents key deletion, blocking automated teardowns and updates.
Relevant Logs and Errors
N/A
Additional Context
The proposed fix is to modify the custom KMS organization policy or find a workaround to bypass the rotation period constraint during deletion.