-
## Description
The `agglayer-gcp-kms` needs to be tested (even a little) to acknowledge its behaviors.
Refactorization in the scope of the `agglayer-gcp-kms` and `agglayer-signer` are ok for this ti…
-
### What happened?
We are using crossplane with `provider-gcp-kms:v1.8.0` and we experience panics
```
k logs pods/gcp-provider-kms-xxxxx -n crossplane
E0901 23:07:06.785441 1 runti…
-
**Description**
You can now decide for advanced encryption key mechanisms on C8 SaaS when creating new clusters. Besides default GCP disk encryption, you can now choose between Software and Hardwar…
-
RONSEAL
## Note:
https://github.com/autotelic/envelope-encryptor/issues/54 is higher priority
We would like ultimately to support GCP. This will look something like:
- a module that expor…
-
Hi everyone. I am a newbie in pulumi. I am having an issue. When I do pulumi login in GCP backend It appears an error: stderr: error: getting secrets manager: passphrase must be set with PULUMI_CONFIG…
-
### TL;DR
Locally, terraform init/plan/apply works flawlessly.
When using GithubActions, the pipeline fails with:
```
Error: Error when reading or editing CloudIdentityGroup "groups/123456":…
-
## **Is your feature request related to a problem? Please describe.**
My job requires a lot of multicloud, unfortunately a lot of the terminology is shared across cloud providers (I.e. VPC in both …
-
### What happened?
In https://github.com/pulumi/pulumi-gcp/issues/2096 it was discovered that Computed + !Optional + !Required is not respected on nested object properties in tfgen.
The schemas …
-
-
EDIT: the immediate issue was worked around: this is now open until the key in metadata is modified so the online-uri for the timestamp/snapshot key is correct.
The value is `gcpkms://projects/sigsto…