@@ -171,7 +171,7 @@ func TestAccAlloydbBackup_usingCMEK(t *testing.T) {
171
171
context := map [string ]interface {}{
172
172
"network_name" : acctest .BootstrapSharedServiceNetworkingConnection (t , "alloydb-backup-cmek-1" ),
173
173
"random_suffix" : acctest .RandString (t , 10 ),
174
- "key_name " : "tf-test-key-" + acctest . RandString ( t , 10 ) ,
174
+ "kms_key_name " : acctest . BootstrapKMSKeyWithPurposeInLocationAndName ( t , "ENCRYPT_DECRYPT" , "us-central1" , "tf-bootstrap-alloydb-backup-key1" ). CryptoKey . Name ,
175
175
}
176
176
177
177
acctest .VcrTest (t , resource.TestCase {
@@ -204,7 +204,7 @@ resource "google_alloydb_backup" "default" {
204
204
"label2" = "updated_key2"
205
205
}
206
206
encryption_config {
207
- kms_key_name = google_kms_crypto_key.key.id
207
+ kms_key_name = "%{kms_key_name}"
208
208
}
209
209
depends_on = [
210
210
google_alloydb_instance.default,
@@ -231,18 +231,8 @@ data "google_compute_network" "default" {
231
231
}
232
232
data "google_project" "project" {}
233
233
234
- resource "google_kms_key_ring" "keyring" {
235
- name = "%{key_name}"
236
- location = "us-central1"
237
- }
238
-
239
- resource "google_kms_crypto_key" "key" {
240
- name = "%{key_name}"
241
- key_ring = google_kms_key_ring.keyring.id
242
- }
243
-
244
234
resource "google_kms_crypto_key_iam_member" "crypto_key" {
245
- crypto_key_id = google_kms_crypto_key.key.id
235
+ crypto_key_id = "%{kms_key_name}"
246
236
role = "roles/cloudkms.cryptoKeyEncrypterDecrypter"
247
237
member = "serviceAccount:service-${data.google_project.project.number}@gcp-sa-alloydb.iam.gserviceaccount.com"
248
238
}
0 commit comments