File tree Expand file tree Collapse file tree 11 files changed +81
-25
lines changed
beta-private-cluster-update-variant
beta-public-cluster-update-variant
private-cluster-update-variant Expand file tree Collapse file tree 11 files changed +81
-25
lines changed Original file line number Diff line number Diff line change @@ -151,7 +151,14 @@ resource "google_container_cluster" "primary" {
151
151
{% if autopilot_cluster != true %}
152
152
default_max_pods_per_node = var.default_max_pods_per_node
153
153
enable_shielded_nodes = var.enable_shielded_nodes
154
- enable_binary_authorization = var.enable_binary_authorization
154
+
155
+ dynamic "binary_authorization" {
156
+ for_each = var.enable_binary_authorization ? [var.enable_binary_authorization] : []
157
+ content {
158
+ evaluation_mode = "PROJECT_SINGLETON_POLICY_ENFORCE"
159
+ }
160
+ }
161
+
155
162
{% if beta_cluster %}
156
163
enable_intranode_visibility = var.enable_intranode_visibility
157
164
enable_kubernetes_alpha = var.enable_kubernetes_alpha
Original file line number Diff line number Diff line change @@ -76,9 +76,16 @@ resource "google_container_cluster" "primary" {
76
76
vertical_pod_autoscaling {
77
77
enabled = var. enable_vertical_pod_autoscaling
78
78
}
79
- default_max_pods_per_node = var. default_max_pods_per_node
80
- enable_shielded_nodes = var. enable_shielded_nodes
81
- enable_binary_authorization = var. enable_binary_authorization
79
+ default_max_pods_per_node = var. default_max_pods_per_node
80
+ enable_shielded_nodes = var. enable_shielded_nodes
81
+
82
+ dynamic "binary_authorization" {
83
+ for_each = var. enable_binary_authorization ? [var . enable_binary_authorization ] : []
84
+ content {
85
+ evaluation_mode = " PROJECT_SINGLETON_POLICY_ENFORCE"
86
+ }
87
+ }
88
+
82
89
dynamic "master_authorized_networks_config" {
83
90
for_each = local. master_authorized_networks_config
84
91
content {
Original file line number Diff line number Diff line change @@ -116,9 +116,16 @@ resource "google_container_cluster" "primary" {
116
116
vertical_pod_autoscaling {
117
117
enabled = var. enable_vertical_pod_autoscaling
118
118
}
119
- default_max_pods_per_node = var. default_max_pods_per_node
120
- enable_shielded_nodes = var. enable_shielded_nodes
121
- enable_binary_authorization = var. enable_binary_authorization
119
+ default_max_pods_per_node = var. default_max_pods_per_node
120
+ enable_shielded_nodes = var. enable_shielded_nodes
121
+
122
+ dynamic "binary_authorization" {
123
+ for_each = var. enable_binary_authorization ? [var . enable_binary_authorization ] : []
124
+ content {
125
+ evaluation_mode = " PROJECT_SINGLETON_POLICY_ENFORCE"
126
+ }
127
+ }
128
+
122
129
enable_intranode_visibility = var. enable_intranode_visibility
123
130
enable_kubernetes_alpha = var. enable_kubernetes_alpha
124
131
enable_tpu = var. enable_tpu
Original file line number Diff line number Diff line change @@ -116,9 +116,16 @@ resource "google_container_cluster" "primary" {
116
116
vertical_pod_autoscaling {
117
117
enabled = var. enable_vertical_pod_autoscaling
118
118
}
119
- default_max_pods_per_node = var. default_max_pods_per_node
120
- enable_shielded_nodes = var. enable_shielded_nodes
121
- enable_binary_authorization = var. enable_binary_authorization
119
+ default_max_pods_per_node = var. default_max_pods_per_node
120
+ enable_shielded_nodes = var. enable_shielded_nodes
121
+
122
+ dynamic "binary_authorization" {
123
+ for_each = var. enable_binary_authorization ? [var . enable_binary_authorization ] : []
124
+ content {
125
+ evaluation_mode = " PROJECT_SINGLETON_POLICY_ENFORCE"
126
+ }
127
+ }
128
+
122
129
enable_intranode_visibility = var. enable_intranode_visibility
123
130
enable_kubernetes_alpha = var. enable_kubernetes_alpha
124
131
enable_tpu = var. enable_tpu
Original file line number Diff line number Diff line change @@ -116,9 +116,16 @@ resource "google_container_cluster" "primary" {
116
116
vertical_pod_autoscaling {
117
117
enabled = var. enable_vertical_pod_autoscaling
118
118
}
119
- default_max_pods_per_node = var. default_max_pods_per_node
120
- enable_shielded_nodes = var. enable_shielded_nodes
121
- enable_binary_authorization = var. enable_binary_authorization
119
+ default_max_pods_per_node = var. default_max_pods_per_node
120
+ enable_shielded_nodes = var. enable_shielded_nodes
121
+
122
+ dynamic "binary_authorization" {
123
+ for_each = var. enable_binary_authorization ? [var . enable_binary_authorization ] : []
124
+ content {
125
+ evaluation_mode = " PROJECT_SINGLETON_POLICY_ENFORCE"
126
+ }
127
+ }
128
+
122
129
enable_intranode_visibility = var. enable_intranode_visibility
123
130
enable_kubernetes_alpha = var. enable_kubernetes_alpha
124
131
enable_tpu = var. enable_tpu
Original file line number Diff line number Diff line change @@ -116,9 +116,16 @@ resource "google_container_cluster" "primary" {
116
116
vertical_pod_autoscaling {
117
117
enabled = var. enable_vertical_pod_autoscaling
118
118
}
119
- default_max_pods_per_node = var. default_max_pods_per_node
120
- enable_shielded_nodes = var. enable_shielded_nodes
121
- enable_binary_authorization = var. enable_binary_authorization
119
+ default_max_pods_per_node = var. default_max_pods_per_node
120
+ enable_shielded_nodes = var. enable_shielded_nodes
121
+
122
+ dynamic "binary_authorization" {
123
+ for_each = var. enable_binary_authorization ? [var . enable_binary_authorization ] : []
124
+ content {
125
+ evaluation_mode = " PROJECT_SINGLETON_POLICY_ENFORCE"
126
+ }
127
+ }
128
+
122
129
enable_intranode_visibility = var. enable_intranode_visibility
123
130
enable_kubernetes_alpha = var. enable_kubernetes_alpha
124
131
enable_tpu = var. enable_tpu
Original file line number Diff line number Diff line change @@ -76,9 +76,16 @@ resource "google_container_cluster" "primary" {
76
76
vertical_pod_autoscaling {
77
77
enabled = var. enable_vertical_pod_autoscaling
78
78
}
79
- default_max_pods_per_node = var. default_max_pods_per_node
80
- enable_shielded_nodes = var. enable_shielded_nodes
81
- enable_binary_authorization = var. enable_binary_authorization
79
+ default_max_pods_per_node = var. default_max_pods_per_node
80
+ enable_shielded_nodes = var. enable_shielded_nodes
81
+
82
+ dynamic "binary_authorization" {
83
+ for_each = var. enable_binary_authorization ? [var . enable_binary_authorization ] : []
84
+ content {
85
+ evaluation_mode = " PROJECT_SINGLETON_POLICY_ENFORCE"
86
+ }
87
+ }
88
+
82
89
dynamic "master_authorized_networks_config" {
83
90
for_each = local. master_authorized_networks_config
84
91
content {
Original file line number Diff line number Diff line change @@ -76,9 +76,16 @@ resource "google_container_cluster" "primary" {
76
76
vertical_pod_autoscaling {
77
77
enabled = var. enable_vertical_pod_autoscaling
78
78
}
79
- default_max_pods_per_node = var. default_max_pods_per_node
80
- enable_shielded_nodes = var. enable_shielded_nodes
81
- enable_binary_authorization = var. enable_binary_authorization
79
+ default_max_pods_per_node = var. default_max_pods_per_node
80
+ enable_shielded_nodes = var. enable_shielded_nodes
81
+
82
+ dynamic "binary_authorization" {
83
+ for_each = var. enable_binary_authorization ? [var . enable_binary_authorization ] : []
84
+ content {
85
+ evaluation_mode = " PROJECT_SINGLETON_POLICY_ENFORCE"
86
+ }
87
+ }
88
+
82
89
dynamic "master_authorized_networks_config" {
83
90
for_each = local. master_authorized_networks_config
84
91
content {
Original file line number Diff line number Diff line change 81
81
82
82
it "has the expected binaryAuthorization config" do
83
83
expect ( data [ 'binaryAuthorization' ] ) . to eq ( {
84
- "enabled " => true ,
84
+ "evaluationMode " => "PROJECT_SINGLETON_POLICY_ENFORCE" ,
85
85
} )
86
86
end
87
87
Original file line number Diff line number Diff line change 76
76
77
77
it "has binary authorization" do
78
78
expect ( data [ 'binaryAuthorization' ] ) . to eq ( {
79
- "enabled " => true ,
79
+ "evaluationMode " => "PROJECT_SINGLETON_POLICY_ENFORCE" ,
80
80
} )
81
81
end
82
82
Original file line number Diff line number Diff line change 70
70
71
71
it "has the expected binaryAuthorization config" do
72
72
expect ( data [ 'binaryAuthorization' ] ) . to eq ( {
73
- "enabled " => true ,
73
+ "evaluationMode " => "PROJECT_SINGLETON_POLICY_ENFORCE" ,
74
74
} )
75
75
end
76
76
end
You can’t perform that action at this time.
0 commit comments