packer-plugin-googlecompute icon indicating copy to clipboard operation
packer-plugin-googlecompute copied to clipboard

Google Cloud - Support for CMEK for VM disk which are created for image creation

Open hc-github-team-packer opened this issue 3 years ago • 0 comments

This issue was originally opened by @kamaltherocky in https://github.com/hashicorp/packer/issues/11272 and has been migrated to this repository. The original issue description is below.


Please search the existing issues for relevant feature requests, and use the reaction feature (https://blog.github.com/2016-03-10-add-reactions-to-pull-requests-issues-and-comments/) to add upvotes to pre-existing requests.

Community Note

Please vote on this issue by adding a 👍 reaction to the original issue to help the community and maintainers prioritize this request. Please do not leave "+1" or "me too" comments, they generate extra noise for issue followers and do not help prioritize the request. If you are interested in working on this issue or have submitted a pull request, please leave a comment.

Description

Currently, Packer only supports creating the new image using CMEK but for disks which are created in the VM used for creating the image.

We have enforced CMEK key for all disks in GCP, so when we run the packer to create an image, the VM is created with a Disk that is not encrypted with CMEK, so security control detects and deletes those VM and disk.

It would be good if the VM created by Packer can build the VM disk with the CMEK key passed to the builder.

Use Case(s)

Any relevant use-cases that you see.

Potential configuration

disk_encryption_key = "CMEK Key Resource ID"

Potential References

Current support for CMEK for images - https://www.packer.io/docs/builders/googlecompute#image_encryption_key

hc-github-team-packer avatar Sep 15 '21 01:09 hc-github-team-packer