You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
According to the documentation, the only way to regenerate a private key resource is to manually taint the resource in state. This can add significant ongoing friction to maintaining a deployment (or several deployments) when secrets rotate.
Proposal
Add some method of rotating the key that relies on changing some derived value in the resource. Maybe something like #395. Or a triggers object like in time_sleep.
How much impact is this issue causing?
Medium
Additional Information
No response
Code of Conduct
I agree to follow this project's Code of Conduct
The text was updated successfully, but these errors were encountered:
Terraform CLI and Provider Versions
Terraform v1.6.4
on darwin_arm64
Use Cases or Problem Statement
According to the documentation, the only way to regenerate a private key resource is to manually taint the resource in state. This can add significant ongoing friction to maintaining a deployment (or several deployments) when secrets rotate.
Proposal
Add some method of rotating the key that relies on changing some derived value in the resource. Maybe something like #395. Or a
triggers
object like intime_sleep
.How much impact is this issue causing?
Medium
Additional Information
No response
Code of Conduct
The text was updated successfully, but these errors were encountered: