Skip to content

Commit 7ac5272

Browse files
promote confidential nodes to GA (#5344) (#3842)
Co-authored-by: upodroid <[email protected]> Signed-off-by: Modular Magician <[email protected]> Co-authored-by: upodroid <[email protected]>
1 parent 26cb4f7 commit 7ac5272

File tree

4 files changed

+13
-3
lines changed

4 files changed

+13
-3
lines changed

.changelog/5344.txt

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
```release-note:enhancement
2+
container: promoted `confidential_nodes` field in `google_container_cluster` to GA
3+
```

google-beta/resource_container_cluster.go

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1754,12 +1754,12 @@ func resourceContainerClusterRead(d *schema.ResourceData, meta interface{}) erro
17541754
if err := d.Set("notification_config", flattenNotificationConfig(cluster.NotificationConfig)); err != nil {
17551755
return err
17561756
}
1757-
if err := d.Set("confidential_nodes", flattenConfidentialNodes(cluster.ConfidentialNodes)); err != nil {
1758-
return err
1759-
}
17601757
if err := d.Set("enable_l4_ilb_subsetting", cluster.NetworkConfig.EnableL4ilbSubsetting); err != nil {
17611758
return fmt.Errorf("Error setting enable_l4_ilb_subsetting: %s", err)
17621759
}
1760+
if err := d.Set("confidential_nodes", flattenConfidentialNodes(cluster.ConfidentialNodes)); err != nil {
1761+
return err
1762+
}
17631763
if err := d.Set("enable_tpu", cluster.EnableTpu); err != nil {
17641764
return fmt.Errorf("Error setting enable_tpu: %s", err)
17651765
}

google-beta/resource_container_cluster_test.go

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2567,6 +2567,7 @@ resource "google_container_cluster" "notification_config" {
25672567
}
25682568
`, clusterName)
25692569
}
2570+
25702571
func testAccContainerCluster_withConfidentialNodes(clusterName string, npName string) string {
25712572
return fmt.Sprintf(`
25722573
resource "google_container_cluster" "confidential_nodes" {

website/docs/r/container_cluster.html.markdown

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -268,6 +268,8 @@ region are guaranteed to support the same version.
268268

269269
* `notification_config` - (Optional, [Beta](https://terraform.io/docs/providers/google/guides/provider_versions.html)) Configuration for the [cluster upgrade notifications](https://cloud.google.com/kubernetes-engine/docs/how-to/cluster-upgrade-notifications) feature. Structure is [documented below](#nested_notification_config).
270270

271+
* `confidential_nodes` - Configuration for [Confidential Nodes](https://cloud.google.com/kubernetes-engine/docs/how-to/confidential-gke-nodes) feature. Structure is documented below [documented below](#nested_confidential_nodes).
272+
271273
* `pod_security_policy_config` - (Optional, [Beta](https://terraform.io/docs/providers/google/guides/provider_versions.html)) Configuration for the
272274
[PodSecurityPolicy](https://cloud.google.com/kubernetes-engine/docs/how-to/pod-security-policies) feature.
273275
Structure is [documented below](#nested_pod_security_policy_config).
@@ -780,6 +782,10 @@ notification_config {
780782
}
781783
```
782784

785+
<a name="nested_confidential_nodes"></a> The `confidential_nodes` block supports:
786+
787+
* `enabled` (Required) - Enable Confidential Nodes for this cluster.
788+
783789
<a name="nested_pod_security_policy_config"></a>The `pod_security_policy_config` block supports:
784790

785791
* `enabled` (Required) - Enable the PodSecurityPolicy controller for this cluster.

0 commit comments

Comments
 (0)