steep-caravan-65104
09/17/2020, 2:48 AMpulumi config set --secret
They receive the following error:
error: constructing secrets manager of type "cloud": secrets (code=PermissionDenied): rpc error: code = PermissionDenied desc = Permission 'cloudkms.cryptoKeyVersions.useToDecrypt' denied on resource 'projects/<gcp-creds-project>/locations/global/keyRings/global-keyring/cryptoKeys/pulumi-secret' (or it may not exist).
With a GCP user or service account which has encrypt + decrypt permissions on the key, this issue is not seen.
Does anyone have ideas about why a DECRYPT key permission would be required to ENCRYPT a secret with pulumi using gcpkms
? This sounds like a pulumi bug to me, could someone suggest workarounds if possible?