Skip to content

Commit f471283

Browse files
remove code not used
1 parent f8fd2d0 commit f471283

File tree

10 files changed

+23
-35
lines changed

10 files changed

+23
-35
lines changed

5-app-infra/business_unit_1/development/main.tf

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -42,11 +42,10 @@ module "peering_gce_instance" {
4242
module "confidential_space" {
4343
source = "../../modules/confidential_space"
4444

45-
environment = local.environment
46-
confidential_image_digest = var.confidential_image_digest
47-
confidential_space_workload_operator = local.confidential_space_workload_sa
48-
business_unit = local.business_unit
49-
project_suffix = "conf-space"
50-
region = coalesce(var.instance_region, local.default_region)
51-
remote_state_bucket = var.remote_state_bucket
45+
environment = local.environment
46+
confidential_image_digest = var.confidential_image_digest
47+
business_unit = local.business_unit
48+
project_suffix = "conf-space"
49+
region = coalesce(var.instance_region, local.default_region)
50+
remote_state_bucket = var.remote_state_bucket
5251
}

5-app-infra/business_unit_1/development/remote.tf

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,8 +15,7 @@
1515
*/
1616

1717
locals {
18-
default_region = data.terraform_remote_state.projects_env.outputs.default_region
19-
confidential_space_workload_sa = data.terraform_remote_state.projects_env.outputs.confidential_space_workload_sa
18+
default_region = data.terraform_remote_state.projects_env.outputs.default_region
2019
}
2120

2221
data "terraform_remote_state" "projects_env" {

5-app-infra/business_unit_1/nonproduction/main.tf

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -42,11 +42,10 @@ module "peering_gce_instance" {
4242
module "confidential_space" {
4343
source = "../../modules/confidential_space"
4444

45-
environment = local.environment
46-
confidential_image_digest = var.confidential_image_digest
47-
confidential_space_workload_operator = local.confidential_space_workload_sa
48-
business_unit = local.business_unit
49-
project_suffix = "conf-space"
50-
region = coalesce(var.instance_region, local.default_region)
51-
remote_state_bucket = var.remote_state_bucket
45+
environment = local.environment
46+
confidential_image_digest = var.confidential_image_digest
47+
business_unit = local.business_unit
48+
project_suffix = "conf-space"
49+
region = coalesce(var.instance_region, local.default_region)
50+
remote_state_bucket = var.remote_state_bucket
5251
}

5-app-infra/business_unit_1/nonproduction/remote.tf

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,8 +15,7 @@
1515
*/
1616

1717
locals {
18-
default_region = data.terraform_remote_state.projects_env.outputs.default_region
19-
confidential_space_workload_sa = data.terraform_remote_state.projects_env.outputs.confidential_space_workload_sa
18+
default_region = data.terraform_remote_state.projects_env.outputs.default_region
2019
}
2120

2221
data "terraform_remote_state" "projects_env" {

5-app-infra/business_unit_1/production/main.tf

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -42,11 +42,10 @@ module "peering_gce_instance" {
4242
module "confidential_space" {
4343
source = "../../modules/confidential_space"
4444

45-
environment = local.environment
46-
confidential_image_digest = var.confidential_image_digest
47-
confidential_space_workload_operator = local.confidential_space_workload_sa
48-
business_unit = local.business_unit
49-
project_suffix = "conf-space"
50-
region = coalesce(var.instance_region, local.default_region)
51-
remote_state_bucket = var.remote_state_bucket
45+
environment = local.environment
46+
confidential_image_digest = var.confidential_image_digest
47+
business_unit = local.business_unit
48+
project_suffix = "conf-space"
49+
region = coalesce(var.instance_region, local.default_region)
50+
remote_state_bucket = var.remote_state_bucket
5251
}

5-app-infra/business_unit_1/production/remote.tf

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,8 +15,7 @@
1515
*/
1616

1717
locals {
18-
default_region = data.terraform_remote_state.projects_env.outputs.default_region
19-
confidential_space_workload_sa = data.terraform_remote_state.projects_env.outputs.confidential_space_workload_sa
18+
default_region = data.terraform_remote_state.projects_env.outputs.default_region
2019
}
2120

2221
data "terraform_remote_state" "projects_env" {

5-app-infra/modules/confidential_space/README.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,6 @@
88
| confidential\_image\_digest | SHA256 digest of the Docker image to be used for running the workload in Confidential Space. This value ensures the integrity and immutability of the image, guaranteeing that only the expected and verified code is executed within the confidential environment. Expected format: `sha256:<digest>`. | `string` | n/a | yes |
99
| confidential\_instance\_type | (Optional) Defines the confidential computing technology the instance uses. SEV is an AMD feature. TDX is an Intel feature. One of the following values is required: SEV, SEV\_SNP, TDX. | `string` | `"SEV"` | no |
1010
| confidential\_machine\_type | Machine type to create for confidential instance. | `string` | `"n2d-standard-2"` | no |
11-
| confidential\_space\_workload\_operator | The person who runs the workload that operates on the combined confidential data. Entries must be in the standard GCP form: `user:[email protected]` or `serviceAccount:[email protected]`. | `string` | `null` | no |
1211
| cpu\_platform | The CPU platform used by this instance. If confidential\_instance\_type is set as SEV, then it is an AMD feature. TDX is an Intel feature. | `string` | `"AMD Milan"` | no |
1312
| environment | The environment the single project belongs to | `string` | n/a | yes |
1413
| num\_instances | Number of instances to create | `number` | `1` | no |

5-app-infra/modules/confidential_space/main.tf

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,6 @@ locals {
3737
resource_manager_tags = local.env_project_resource_manager_tags[var.project_suffix]
3838
artifact_registry_repository = "tf-runners"
3939
confidential_space_project_number = data.terraform_remote_state.projects_env.outputs.confidential_space_project_number
40-
confidential_space_project_id = data.terraform_remote_state.projects_env.outputs.confidential_space_project
4140
confidential_space_workload_sa = data.terraform_remote_state.projects_env.outputs.confidential_space_workload_sa
4241
}
4342

5-app-infra/modules/confidential_space/variables.tf

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -88,9 +88,3 @@ variable "confidential_image_digest" {
8888
type = string
8989
}
9090

91-
variable "confidential_space_workload_operator" {
92-
description = "The person who runs the workload that operates on the combined confidential data. Entries must be in the standard GCP form: `user:[email protected]` or `serviceAccount:[email protected]`."
93-
type = string
94-
default = null
95-
}
96-

5-app-infra/modules/env_base/variables.tf

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -39,11 +39,13 @@ variable "num_instances" {
3939

4040
variable "machine_type" {
4141
description = "Machine type to create, e.g. n1-standard-1"
42+
type = string
4243
default = "f1-micro"
4344
}
4445

4546
variable "hostname" {
4647
description = "Hostname of instances"
48+
type = string
4749
default = "example-app"
4850
}
4951

0 commit comments

Comments
 (0)