Skip to content

Commit 2ecf166

Browse files
Clarify lifecycle of google_secret_manager_secret_version and google_secret_manager_regional_secret_version resource in documentation (#13428) (#21988)
[upstream:2af400c59d41b620a165795a06cbade1cb51cb3c] Signed-off-by: Modular Magician <[email protected]>
1 parent c526768 commit 2ecf166

File tree

3 files changed

+15
-0
lines changed

3 files changed

+15
-0
lines changed

.changelog/13428.txt

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
```release-note: note
2+
secretmanager: Updated the documentation for the clarification of `google_secret_manager_secret_version` and `google_secret_manager_regional_secret_version` resources
3+
```

website/docs/r/secret_manager_regional_secret_version.html.markdown

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,12 @@ To get more information about RegionalSecretVersion, see:
3030
* How-to Guides
3131
* [Create and deploy a Regional Secret Version](https://cloud.google.com/secret-manager/regional-secrets/add-secret-version-rs)
3232

33+
~> **Warning:** The behavior of the `secret_data` field is [force new](https://developer.hashicorp.com/terraform/plugin/sdkv2/schemas/schema-behaviors#forcenew).
34+
While updating this field, Terraform deletes the existing resource and then creates a new one, which may cause potential outages. To mitigate
35+
this, use the `create_before_destroy` field within the lifecycle block.
36+
37+
For more details, refer to the [Terraform lifecycle documentation](https://developer.hashicorp.com/terraform/language/meta-arguments/lifecycle#the-lifecycle-meta-argument).
38+
3339
~> **Warning:** All arguments including the following potentially sensitive
3440
values will be stored in the raw state as plain text: `payload.secret_data`.
3541
[Read more about sensitive data in state](https://www.terraform.io/language/state/sensitive-data).

website/docs/r/secret_manager_secret_version.html.markdown

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,12 @@ To get more information about SecretVersion, see:
3030
* How-to Guides
3131
* [Create and deploy a Secret Version](https://cloud.google.com/secret-manager/docs/add-secret-version)
3232

33+
~> **Warning:** The behavior of the `secret_data` field is [force new](https://developer.hashicorp.com/terraform/plugin/sdkv2/schemas/schema-behaviors#forcenew).
34+
While updating this field, Terraform deletes the existing resource and then creates a new one, which may cause potential outages. To mitigate
35+
this, use the `create_before_destroy` field within the lifecycle block.
36+
37+
For more details, refer to the [Terraform lifecycle documentation](https://developer.hashicorp.com/terraform/language/meta-arguments/lifecycle#the-lifecycle-meta-argument).
38+
3339
~> **Warning:** All arguments including the following potentially sensitive
3440
values will be stored in the raw state as plain text: `payload.secret_data`.
3541
[Read more about sensitive data in state](https://www.terraform.io/language/state/sensitive-data).

0 commit comments

Comments
 (0)