You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* feat: update TPG version constraints to allow 4.0 * Removes basic auth, renames namespace_identity * Regenerates modules and documentation * Updates tests to use latest Google provider * addresses warning about multiple provider blocks * Updates network module for Google provider 4.0 compatibility * Temporarily uses "main" for gcloud module (until next release is cut) * Comments out version constraint (temporary change) * fetches main branch by default? * Uses master branch for gcloud module (until release is cut) * Uses kubectl-wrapper where appropriate * Uses released version of gcloud module * Returns instance group URLs per node pool * Extends use of cluster_output_node_pools_ variables * Fixes documentation * Updates more modules * Updates READMEs to match variables * Uses master branch of bastion * temporary change until new version is released * Updates node pools versions description * Adds locals for node pool instance group URLs * Uses master branch of terraform-google-project-factory * temporary change until new version of that dependency is released * Updates project version ready for release * Updates pinned version of Google provider for example * Updates pinned version of Google provider in example * Addresses code review comments * Temporarily applies an empty source_tags setting. * this should be removed once hashicorp/terraform-provider-google#10494 is addressed * Fixes indentation * Uses newly-released version of project factory * Uses released version of bastion host * Removes use of SECURE mode (deprecated) * test empty source tag workaround * fix wi test * refactor IAM test for loose match * map old node meta value, add validations * update docs * Update autogen/main/variables.tf.tmpl Co-authored-by: Morgante Pell <morgantep@google.com> * remove local Co-authored-by: cloud-foundation-bot <cloud-foundation-bot@google.com> Co-authored-by: Jack Whelpton <jack.whelpton@rakuten.com> Co-authored-by: Morgante Pell <morgantep@google.com>
Copy file name to clipboardExpand all lines: README.md
+4-6Lines changed: 4 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -128,8 +128,6 @@ Then perform the following commands on the root folder:
128
128
| add\_master\_webhook\_firewall\_rules | Create master\_webhook firewall rules for ports defined in `firewall_inbound_ports`|`bool`|`false`| no |
129
129
| add\_shadow\_firewall\_rules | Create GKE shadow firewall (the same as default firewall rules with firewall logs enabled). |`bool`|`false`| no |
130
130
| authenticator\_security\_group | The name of the RBAC security group for use with Google security groups in Kubernetes RBAC. Group name must be in format gke-security-groups@yourdomain.com|`string`|`null`| no |
131
-
| basic\_auth\_password | The password to be used with Basic Authentication. |`string`|`""`| no |
132
-
| basic\_auth\_username | The username to be used with Basic Authentication. An empty value will disable Basic Authentication, which is the recommended configuration. |`string`|`""`| no |
| cluster\_ipv4\_cidr | The IP address range of the kubernetes pods in this cluster. Default is an automatically assigned CIDR. |`any`|`null`| no |
135
133
| cluster\_resource\_labels | The GCE resource labels (a map of key/value pairs) to be applied to the cluster |`map(string)`|`{}`| no |
@@ -151,7 +149,7 @@ Then perform the following commands on the root folder:
151
149
| grant\_registry\_access | Grants created cluster-specific service account storage.objectViewer and artifactregistry.reader roles. |`bool`|`false`| no |
152
150
| horizontal\_pod\_autoscaling | Enable horizontal pod autoscaling addon |`bool`|`true`| no |
153
151
| http\_load\_balancing | Enable httpload balancer addon |`bool`|`true`| no |
154
-
| identity\_namespace |Workload Identity namespace. (Default value of `enabled` automatically sets projectbased namespace`[project_id].svc.id.goog`) |`string`|`"enabled"`| no |
152
+
| identity\_namespace |The workload pool to attach all Kubernetes service accounts to. (Default value of `enabled` automatically sets project-based pool`[project_id].svc.id.goog`) |`string`|`"enabled"`| no |
155
153
| impersonate\_service\_account | An optional service account to impersonate for gcloud commands. If this service account is not specified, the module will use Application Default Credentials. |`string`|`""`| no |
156
154
| initial\_node\_count | The number of nodes to create in this cluster's default node pool. |`number`|`0`| no |
157
155
| ip\_masq\_link\_local | Whether to masquerade traffic to the link-local prefix (169.254.0.0/16). |`bool`|`false`| no |
@@ -170,7 +168,7 @@ Then perform the following commands on the root folder:
170
168
| network\_policy | Enable network policy addon |`bool`|`false`| no |
171
169
| network\_policy\_provider | The network policy provider. |`string`|`"CALICO"`| no |
172
170
| network\_project\_id | The project ID of the shared VPC's host (for shared vpc support) |`string`|`""`| no |
173
-
| node\_metadata | Specifies how node metadata is exposed to the workload running on the node |`string`|`"GKE_METADATA_SERVER"`| no |
171
+
| node\_metadata | Specifies how node metadata is exposed to the workload running on the node |`string`|`"GKE_METADATA"`| no |
174
172
| node\_pools | List of maps containing node pools |`list(map(string))`| <pre>[<br> {<br> "name": "default-node-pool"<br> }<br>]</pre> | no |
175
173
| node\_pools\_labels | Map of maps containing node labels by node-pool name |`map(map(string))`| <pre>{<br> "all": {},<br> "default-node-pool": {}<br>}</pre> | no |
176
174
| node\_pools\_metadata | Map of maps containing node metadata by node-pool name |`map(map(string))`| <pre>{<br> "all": {},<br> "default-node-pool": {}<br>}</pre> | no |
@@ -202,7 +200,7 @@ Then perform the following commands on the root folder:
202
200
| endpoint | Cluster endpoint |
203
201
| horizontal\_pod\_autoscaling\_enabled | Whether horizontal pod autoscaling enabled |
Copy file name to clipboardExpand all lines: autogen/main/variables.tf.tmpl
+7-14Lines changed: 7 additions & 14 deletions
Original file line number
Diff line number
Diff line change
@@ -394,18 +394,6 @@ variable "service_account" {
394
394
default = ""
395
395
}
396
396
397
-
variable "basic_auth_username" {
398
-
type = string
399
-
description = "The username to be used with Basic Authentication. An empty value will disable Basic Authentication, which is the recommended configuration."
400
-
default = ""
401
-
}
402
-
403
-
variable "basic_auth_password" {
404
-
type = string
405
-
description = "The password to be used with Basic Authentication."
406
-
default = ""
407
-
}
408
-
409
397
variable "issue_client_certificate" {
410
398
type = bool
411
399
description = "Issues a client certificate to authenticate to the cluster endpoint. To maximize the security of your cluster, leave this option disabled. Client certificates don't automatically rotate and aren't easily revocable. WARNING: changing this after cluster creation is destructive!"
description = "Workload Identity namespace. (Default value of `enabled` automatically sets projectbased namespace `[project_id].svc.id.goog`)"
560
+
description = "The workload pool to attach all Kubernetes service accounts to. (Default value of `enabled` automatically sets project-based pool `[project_id].svc.id.goog`)"
0 commit comments