Skip to content

Commit c197597

Browse files
committed
Regenerate modules
1 parent 3b83eb3 commit c197597

File tree

14 files changed

+99
-16
lines changed

14 files changed

+99
-16
lines changed

README.md

Lines changed: 24 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -129,46 +129,63 @@ In either case, upgrading to module version `v1.0.0` will trigger a recreation o
129129

130130
| Name | Description | Type | Default | Required |
131131
|------|-------------|:----:|:-----:|:-----:|
132+
| authenticator\_security\_group | The name of the RBAC security group for use with Google security groups in Kubernetes RBAC. Group name must be in format [email protected] | string | `"null"` | no |
132133
| basic\_auth\_password | The password to be used with Basic Authentication. | string | `""` | no |
133134
| basic\_auth\_username | The username to be used with Basic Authentication. An empty value will disable Basic Authentication, which is the recommended configuration. | string | `""` | no |
135+
| cloudrun | (Beta) Enable CloudRun addon | string | `"false"` | no |
134136
| cluster\_ipv4\_cidr | The IP address range of the kubernetes pods in this cluster. Default is an automatically assigned CIDR. | string | `""` | no |
135137
| cluster\_resource\_labels | The GCE resource labels (a map of key/value pairs) to be applied to the cluster | map(string) | `<map>` | no |
136138
| configure\_ip\_masq | Enables the installation of ip masquerading, which is usually no longer required when using aliasied IP addresses. IP masquerading uses a kubectl call, so when you have a private cluster, you will need access to the API server. | string | `"false"` | no |
137139
| create\_service\_account | Defines if service account specified to run nodes should be created. | bool | `"true"` | no |
140+
| database\_encryption | Application-layer Secrets Encryption settings. The object format is {state = string, key_name = string}. Valid values of state are: "ENCRYPTED"; "DECRYPTED". key_name is the name of a CloudKMS key. | object | `<list>` | no |
141+
| default\_max\_pods\_per\_node | The maximum number of pods to schedule per node | string | `"110"` | no |
142+
| deploy\_using\_private\_endpoint | (Beta) A toggle for Terraform and kubectl to connect to the master's internal IP address during deployment. | bool | `"false"` | no |
138143
| description | The description of the cluster | string | `""` | no |
139144
| disable\_legacy\_metadata\_endpoints | Disable the /0.1/ and /v1beta1/ metadata server endpoints on the node. Changing this value will cause all node pools to be recreated. | bool | `"true"` | no |
145+
| enable\_binary\_authorization | Enable BinAuthZ Admission controller | string | `"false"` | no |
146+
| enable\_intranode\_visibility | Whether Intra-node visibility is enabled for this cluster. This makes same node pod to pod traffic visible for VPC network | bool | `"false"` | no |
147+
| enable\_private\_endpoint | (Beta) Whether the master's internal IP address is used as the cluster endpoint | bool | `"false"` | no |
148+
| enable\_private\_nodes | (Beta) Whether nodes have internal IP addresses only | bool | `"false"` | no |
149+
| enable\_vertical\_pod\_autoscaling | Vertical Pod Autoscaling automatically adjusts the resources of pods controlled by it | bool | `"false"` | no |
140150
| grant\_registry\_access | Grants created cluster-specific service account storage.objectViewer role. | bool | `"false"` | no |
141151
| horizontal\_pod\_autoscaling | Enable horizontal pod autoscaling addon | bool | `"true"` | no |
142152
| http\_load\_balancing | Enable httpload balancer addon | bool | `"true"` | no |
153+
| identity\_namespace | Workload Identity namespace | string | `""` | no |
143154
| initial\_node\_count | The number of nodes to create in this cluster's default node pool. | number | `"0"` | no |
144155
| ip\_masq\_link\_local | Whether to masquerade traffic to the link-local prefix (169.254.0.0/16). | bool | `"false"` | no |
145156
| ip\_masq\_resync\_interval | The interval at which the agent attempts to sync its ConfigMap file from the disk. | string | `"60s"` | no |
146157
| ip\_range\_pods | The _name_ of the secondary subnet ip range to use for pods | string | n/a | yes |
147158
| ip\_range\_services | The _name_ of the secondary subnet range to use for services | string | n/a | yes |
148159
| issue\_client\_certificate | Issues a client certificate to authenticate to the cluster endpoint. To maximize the security of your cluster, leave this option disabled. Client certificates don't automatically rotate and aren't easily revocable. WARNING: changing this after cluster creation is destructive! | bool | `"false"` | no |
160+
| istio | (Beta) Enable Istio addon | string | `"false"` | no |
149161
| kubernetes\_dashboard | Enable kubernetes dashboard addon | bool | `"false"` | no |
150162
| kubernetes\_version | The Kubernetes version of the masters. If set to 'latest' it will pull latest available version in the selected region. | string | `"latest"` | no |
151163
| logging\_service | The logging service that the cluster should write logs to. Available options include logging.googleapis.com, logging.googleapis.com/kubernetes (beta), and none | string | `"logging.googleapis.com"` | no |
152164
| maintenance\_start\_time | Time window specified for daily maintenance operations in RFC3339 format | string | `"05:00"` | no |
153165
| master\_authorized\_networks\_config | The desired configuration options for master authorized networks. The object format is {cidr_blocks = list(object({cidr_block = string, display_name = string}))}. Omit the nested cidr_blocks attribute to disallow external access (except the cluster node IPs, which GKE automatically whitelists). | object | `<list>` | no |
166+
| master\_ipv4\_cidr\_block | (Beta) The IP range in CIDR notation to use for the hosted master network | string | `"10.0.0.0/28"` | no |
154167
| monitoring\_service | The monitoring service that the cluster should write metrics to. Automatically send metrics from pods in the cluster to the Google Cloud Monitoring API. VM metrics will be collected by Google Compute Engine regardless of this setting Available options include monitoring.googleapis.com, monitoring.googleapis.com/kubernetes (beta) and none | string | `"monitoring.googleapis.com"` | no |
155168
| name | The name of the cluster (required) | string | n/a | yes |
156169
| network | The VPC network to host the cluster in (required) | string | n/a | yes |
157170
| network\_policy | Enable network policy addon | bool | `"false"` | no |
158171
| network\_policy\_provider | The network policy provider. | string | `"CALICO"` | no |
159172
| network\_project\_id | The project ID of the shared VPC's host (for shared vpc support) | string | `""` | no |
173+
| node\_metadata | Specifies how node metadata is exposed to the workload running on the node | string | `"SECURE"` | no |
160174
| node\_pools | List of maps containing node pools | list(map(string)) | `<list>` | no |
161175
| node\_pools\_labels | Map of maps containing node labels by node-pool name | map(map(string)) | `<map>` | no |
162176
| node\_pools\_metadata | Map of maps containing node metadata by node-pool name | map(map(string)) | `<map>` | no |
163177
| node\_pools\_oauth\_scopes | Map of lists containing node oauth scopes by node-pool name | map(list(string)) | `<map>` | no |
164178
| node\_pools\_tags | Map of lists containing node network tags by node-pool name | map(list(string)) | `<map>` | no |
179+
| node\_pools\_taints | Map of lists containing node taints by node-pool name | object | `<map>` | no |
165180
| node\_version | The Kubernetes version of the node pools. Defaults kubernetes_version (master) variable and can be overridden for individual node pools by setting the `version` key on them. Must be empyty or set the same as master at cluster creation. | string | `""` | no |
166181
| non\_masquerade\_cidrs | List of strings in CIDR notation that specify the IP address ranges that do not use IP masquerading. | list(string) | `<list>` | no |
182+
| pod\_security\_policy\_config | enabled - Enable the PodSecurityPolicy controller for this cluster. If enabled, pods must be valid under a PodSecurityPolicy to be created. | list | `<list>` | no |
167183
| project\_id | The project ID to host the cluster in (required) | string | n/a | yes |
168-
| region | The region to host the cluster in (optional if zonal cluster / required if regional) | string | `"null"` | no |
184+
| region | The region to host the cluster in (required) | string | n/a | yes |
169185
| regional | Whether is a regional cluster (zonal cluster if set false. WARNING: changing this after cluster creation is destructive!) | bool | `"true"` | no |
170-
| registry\_project\_id | Project holding the Google Container Registry. If empty, we use the cluster project. If grant_registry_access is true, storage.objectViewer role is assigned on this project. | string | `""` | no |
171186
| remove\_default\_node\_pool | Remove default node pool while setting up the cluster | bool | `"false"` | no |
187+
| resource\_usage\_export\_dataset\_id | The dataset id for which network egress metering for this cluster will be enabled. If enabled, a daemonset will be created in the cluster to meter network egress traffic. | string | `""` | no |
188+
| sandbox\_enabled | (Beta) Enable GKE Sandbox (Do not forget to set `image_type` = `COS_CONTAINERD` and `node_version` = `1.12.7-gke.17` or later to use it). | bool | `"false"` | no |
172189
| service\_account | The service account to run nodes as if not overridden in `node_pools`. The create_service_account variable default value (true) will cause a cluster-specific service account to be created. | string | `""` | no |
173190
| stub\_domains | Map of stub domains and their resolvers to forward DNS queries for a certain domain to an external DNS server | map(list(string)) | `<map>` | no |
174191
| subnetwork | The subnetwork to host the cluster in (required) | string | n/a | yes |
@@ -180,9 +197,12 @@ In either case, upgrading to module version `v1.0.0` will trigger a recreation o
180197
| Name | Description |
181198
|------|-------------|
182199
| ca\_certificate | Cluster ca certificate (base64 encoded) |
200+
| cloudrun\_enabled | Whether CloudRun enabled |
183201
| endpoint | Cluster endpoint |
184202
| horizontal\_pod\_autoscaling\_enabled | Whether horizontal pod autoscaling enabled |
185203
| http\_load\_balancing\_enabled | Whether http load balancing enabled |
204+
| intranode\_visibility\_enabled | Whether intra-node visibility is enabled |
205+
| istio\_enabled | Whether Istio is enabled |
186206
| kubernetes\_dashboard\_enabled | Whether kubernetes dashboard enabled |
187207
| location | Cluster location (region if regional cluster, zone if zonal cluster) |
188208
| logging\_service | Logging service used |
@@ -194,9 +214,11 @@ In either case, upgrading to module version `v1.0.0` will trigger a recreation o
194214
| network\_policy\_enabled | Whether network policy enabled |
195215
| node\_pools\_names | List of node pools names |
196216
| node\_pools\_versions | List of node pools versions |
217+
| pod\_security\_policy\_enabled | Whether pod security policy is enabled |
197218
| region | Cluster region |
198219
| service\_account | The service account to default running nodes as if not overridden in `node_pools`. |
199220
| type | Cluster type (regional / zonal) |
221+
| vertical\_pod\_autoscaling\_enabled | Whether veritical pod autoscaling is enabled |
200222
| zones | List of zones in which the cluster resides |
201223

202224
<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK -->

modules/beta-private-cluster-update-variant/README.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -258,6 +258,9 @@ following project roles:
258258
- roles/iam.serviceAccountUser
259259
- roles/resourcemanager.projectIamAdmin (only required if `service_account` is set to `create`)
260260

261+
Additionally, if `service_account` is set to `create` and `grant_registry_access` is requested, the service account requires the following role on the `registry_project_id` project:
262+
- roles/resourcemanager.projectIamAdmin
263+
261264
### Enable APIs
262265
In order to operate with the Service Account you must activate the following APIs on the project where the Service Account was created:
263266

modules/beta-private-cluster-update-variant/main.tf

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ data "google_compute_zones" "available" {
2323
provider = google-beta
2424

2525
project = var.project_id
26-
region = var.region
26+
region = local.region
2727
}
2828

2929
resource "random_shuffle" "available_zones" {
@@ -34,6 +34,7 @@ resource "random_shuffle" "available_zones" {
3434
locals {
3535
// location
3636
location = var.regional ? var.region : var.zones[0]
37+
region = var.region == null ? join("-", slice(split("-", var.zones[0]), 0, 2)) : var.region
3738
// for regional cluster - use var.zones if provided, use available otherwise, for zonal cluster use var.zones with first element extracted
3839
node_locations = var.regional ? coalescelist(compact(var.zones), sort(random_shuffle.available_zones.result)) : slice(var.zones, 1, length(var.zones))
3940
// kuberentes version

modules/beta-private-cluster-update-variant/networks.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,6 @@ data "google_compute_subnetwork" "gke_subnetwork" {
2727
provider = google-beta
2828

2929
name = var.subnetwork
30-
region = var.region
30+
region = local.region
3131
project = local.network_project_id
3232
}

modules/beta-private-cluster-update-variant/sa.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ resource "google_project_iam_member" "cluster_service_account-monitoring_viewer"
6464

6565
resource "google_project_iam_member" "cluster_service_account-gcr" {
6666
count = var.create_service_account && var.grant_registry_access ? 1 : 0
67-
project = var.project_id
67+
project = var.registry_project_id == "" ? var.project_id : var.registry_project_id
6868
role = "roles/storage.objectViewer"
6969
member = "serviceAccount:${google_service_account.cluster_service_account[0].email}"
7070
}

modules/beta-private-cluster-update-variant/variables.tf

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,8 @@ variable "regional" {
4040

4141
variable "region" {
4242
type = string
43-
description = "The region to host the cluster in (required)"
43+
description = "The region to host the cluster in (optional if zonal cluster / required if regional)"
44+
default = null
4445
}
4546

4647
variable "zones" {
@@ -267,6 +268,12 @@ variable "grant_registry_access" {
267268
default = false
268269
}
269270

271+
variable "registry_project_id" {
272+
type = string
273+
description = "Project holding the Google Container Registry. If empty, we use the cluster project. If grant_registry_access is true, storage.objectViewer role is assigned on this project."
274+
default = ""
275+
}
276+
270277
variable "service_account" {
271278
type = string
272279
description = "The service account to run nodes as if not overridden in `node_pools`. The create_service_account variable default value (true) will cause a cluster-specific service account to be created."

modules/beta-private-cluster/README.md

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -188,9 +188,8 @@ In either case, upgrading to module version `v1.0.0` will trigger a recreation o
188188
| non\_masquerade\_cidrs | List of strings in CIDR notation that specify the IP address ranges that do not use IP masquerading. | list(string) | `<list>` | no |
189189
| pod\_security\_policy\_config | enabled - Enable the PodSecurityPolicy controller for this cluster. If enabled, pods must be valid under a PodSecurityPolicy to be created. | list | `<list>` | no |
190190
| project\_id | The project ID to host the cluster in (required) | string | n/a | yes |
191-
| region | The region to host the cluster in (optional if zonal cluster / required if regional) | string | `"null"` | no |
191+
| region | The region to host the cluster in (required) | string | n/a | yes |
192192
| regional | Whether is a regional cluster (zonal cluster if set false. WARNING: changing this after cluster creation is destructive!) | bool | `"true"` | no |
193-
| registry\_project\_id | Project holding the Google Container Registry. If empty, we use the cluster project. If grant_registry_access is true, storage.objectViewer role is assigned on this project. | string | `""` | no |
194193
| remove\_default\_node\_pool | Remove default node pool while setting up the cluster | bool | `"false"` | no |
195194
| resource\_usage\_export\_dataset\_id | The dataset id for which network egress metering for this cluster will be enabled. If enabled, a daemonset will be created in the cluster to meter network egress traffic. | string | `""` | no |
196195
| sandbox\_enabled | (Beta) Enable GKE Sandbox (Do not forget to set `image_type` = `COS_CONTAINERD` and `node_version` = `1.12.7-gke.17` or later to use it). | bool | `"false"` | no |

0 commit comments

Comments
 (0)