Skip to content

Commit b09ec74

Browse files
authored
fix: Revert "feat: Add blueprint metadata for cloud dns module (#129)" (#136)
Co-authored-by: Saranya3 <ssranya@google.com>
1 parent bda8e40 commit b09ec74

File tree

23 files changed

+23
-786
lines changed

23 files changed

+23
-786
lines changed

Makefile

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,6 @@ docker_test_integration:
6868
.PHONY: docker_test_lint
6969
docker_test_lint:
7070
docker run --rm -it \
71-
-e ENABLE_BPMETADATA=1 \
7271
-v $(CURDIR):/workspace \
7372
$(REGISTRY_URL)/${DOCKER_IMAGE_DEVELOPER_TOOLS}:${DOCKER_TAG_VERSION_DEVELOPER_TOOLS} \
7473
/usr/local/bin/test_lint.sh
@@ -77,10 +76,9 @@ docker_test_lint:
7776
.PHONY: docker_generate_docs
7877
docker_generate_docs:
7978
docker run --rm -it \
80-
-e ENABLE_BPMETADATA=1 \
81-
-v "$(CURDIR)":/workspace \
79+
-v $(CURDIR):/workspace \
8280
$(REGISTRY_URL)/${DOCKER_IMAGE_DEVELOPER_TOOLS}:${DOCKER_TAG_VERSION_DEVELOPER_TOOLS} \
83-
/bin/bash -c 'source /usr/local/bin/task_helper_functions.sh && generate_docs display'
81+
/bin/bash -c 'source /usr/local/bin/task_helper_functions.sh && generate_docs'
8482

8583
# Alias for backwards compatibility
8684
.PHONY: generate_docs

README.md

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -67,16 +67,11 @@ Functional examples are included in the [examples](./examples/) directory.
6767
| domain | Zone domain, must end with a period. | `string` | n/a | yes |
6868
| enable\_logging | Enable query logging for this ManagedZone | `bool` | `false` | no |
6969
| force\_destroy | Set this true to delete all records in the zone. | `bool` | `false` | no |
70-
| gke\_clusters\_list | The list of Google Kubernetes Engine clusters that can see this zone. | `list(string)` | `[]` | no |
71-
| iam\_choice | Opt 1. iam\_binding, 2. iam\_member, 3. iam\_policy | `string` | n/a | yes |
7270
| labels | A set of key/value label pairs to assign to this ManagedZone | `map(any)` | `{}` | no |
73-
| member | Identities that will be granted the privilege in role | `string` | n/a | yes |
74-
| members | Identities that will be granted the privilege in role | `list(string)` | n/a | yes |
7571
| name | Zone name, must be unique within the project. | `string` | n/a | yes |
7672
| private\_visibility\_config\_networks | List of VPC self links that can see this zone. | `list(string)` | `[]` | no |
7773
| project\_id | Project id for the zone. | `string` | n/a | yes |
7874
| recordsets | List of DNS record objects to manage, in the standard terraform dns structure. | <pre>list(object({<br> name = string<br> type = string<br> ttl = number<br> records = optional(list(string), null)<br><br> routing_policy = optional(object({<br> wrr = optional(list(object({<br> weight = number<br> records = list(string)<br> })), [])<br> geo = optional(list(object({<br> location = string<br> records = list(string)<br> })), [])<br> }))<br> }))</pre> | `[]` | no |
79-
| role | The role that should be applied | `string` | n/a | yes |
8075
| service\_namespace\_url | The fully qualified or partial URL of the service directory namespace that should be associated with the zone. This should be formatted like https://servicedirectory.googleapis.com/v1/projects/{project}/locations/{location}/namespaces/{namespace_id} or simply projects/{project}/locations/{location}/namespaces/{namespace\_id}. | `string` | `""` | no |
8176
| target\_name\_server\_addresses | List of target name servers for forwarding zone. | `list(map(any))` | `[]` | no |
8277
| target\_network | Peering network. | `string` | `""` | no |
@@ -87,7 +82,6 @@ Functional examples are included in the [examples](./examples/) directory.
8782
| Name | Description |
8883
|------|-------------|
8984
| domain | The DNS zone domain. |
90-
| etag | The etag of the IAM policy |
9185
| name | The DNS zone name. |
9286
| name\_servers | The DNS zone name servers. |
9387
| type | The DNS zone type. |

examples/dns_response_policy/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@
1616

1717
module "dns_response_policy" {
1818
source = "terraform-google-modules/cloud-dns/google//modules/dns_response_policy"
19-
version = "~> 6.1.0"
19+
version = "~> 6.0"
2020

2121
project_id = var.project_id
2222
policy_name = "dns-response-policy-test"

examples/forwarding-zone/main.tf

Lines changed: 1 addition & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@
1616

1717
module "dns-forwarding-zone" {
1818
source = "terraform-google-modules/cloud-dns/google"
19-
version = "~> 6.1.0"
19+
version = "~> 6.0"
2020

2121
project_id = var.project_id
2222
type = "forwarding"
@@ -35,9 +35,4 @@ module "dns-forwarding-zone" {
3535
forwarding_path = "default"
3636
}
3737
]
38-
39-
iam_choice = "iam_member"
40-
role = "roles/viewer"
41-
member = "serviceAccount:ci-account@${var.project_id}.iam.gserviceaccount.com"
42-
members = []
4338
}

examples/peering-zone/main.tf

Lines changed: 1 addition & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@
1616

1717
module "dns-peering-zone" {
1818
source = "terraform-google-modules/cloud-dns/google"
19-
version = "~> 6.1.0"
19+
version = "~> 6.0"
2020

2121
project_id = var.project_id
2222
type = "peering"
@@ -25,9 +25,4 @@ module "dns-peering-zone" {
2525
private_visibility_config_networks = [var.network_self_link]
2626
target_network = var.target_network_self_link
2727
labels = var.labels
28-
29-
iam_choice = "iam_member"
30-
role = "roles/viewer"
31-
member = "serviceAccount:ci-account@${var.project_id}.gserviceaccount.com"
32-
members = []
3328
}

examples/private-zone/main.tf

Lines changed: 1 addition & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@
1616

1717
module "dns-private-zone" {
1818
source = "terraform-google-modules/cloud-dns/google"
19-
version = "~> 6.1.0"
19+
version = "~> 6.0"
2020

2121
project_id = var.project_id
2222
type = "private"
@@ -68,9 +68,4 @@ module "dns-private-zone" {
6868
]
6969
},
7070
]
71-
72-
iam_choice = "iam_policy"
73-
role = "roles/dns.reader"
74-
member = "serviceAccount:ci-account@${var.project_id}.iam.gserviceaccount.com"
75-
members = []
7671
}

examples/private-zone/outputs.tf

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -18,9 +18,3 @@ output "name_servers" {
1818
description = "Zone name servers."
1919
value = module.dns-private-zone.name_servers
2020
}
21-
22-
output "etag" {
23-
description = "The etag of the IAM policy."
24-
value = module.dns-private-zone.etag
25-
}
26-

examples/public-zone/main.tf

Lines changed: 1 addition & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@
1616

1717
module "dns-public-zone" {
1818
source = "terraform-google-modules/cloud-dns/google"
19-
version = "~> 6.1.0"
19+
version = "~> 6.0"
2020

2121
project_id = var.project_id
2222
type = "public"
@@ -69,9 +69,4 @@ module "dns-public-zone" {
6969
]
7070
},
7171
]
72-
73-
iam_choice = "iam_policy"
74-
role = "roles/dns.reader"
75-
member = "serviceAccount:ci-account@${var.project_id}.iam.gserviceaccount.com"
76-
members = []
7772
}

main.tf

Lines changed: 13 additions & 116 deletions
Original file line numberDiff line numberDiff line change
@@ -14,13 +14,6 @@
1414
* limitations under the License.
1515
*/
1616

17-
data "google_iam_policy" "admin" {
18-
binding {
19-
role = var.role
20-
members = var.members
21-
}
22-
}
23-
2417
resource "google_dns_managed_zone" "peering" {
2518
count = var.type == "peering" ? 1 : 0
2619
project = var.project_id
@@ -32,22 +25,14 @@ resource "google_dns_managed_zone" "peering" {
3225
force_destroy = var.force_destroy
3326

3427
dynamic "private_visibility_config" {
35-
for_each = length(var.private_visibility_config_networks) > 0 || length(var.gke_clusters_list) > 0 ? [1] : []
36-
28+
for_each = length(var.private_visibility_config_networks) > 0 ? [1] : []
3729
content {
3830
dynamic "networks" {
39-
for_each = toset(var.private_visibility_config_networks)
31+
for_each = var.private_visibility_config_networks
4032
content {
4133
network_url = networks.value
4234
}
4335
}
44-
45-
dynamic "gke_clusters" {
46-
for_each = toset(var.gke_clusters_list)
47-
content {
48-
gke_cluster_name = gke_clusters.value
49-
}
50-
}
5136
}
5237
}
5338

@@ -69,22 +54,14 @@ resource "google_dns_managed_zone" "forwarding" {
6954
force_destroy = var.force_destroy
7055

7156
dynamic "private_visibility_config" {
72-
for_each = length(var.private_visibility_config_networks) > 0 || length(var.gke_clusters_list) > 0 ? [1] : []
73-
57+
for_each = length(var.private_visibility_config_networks) > 0 ? [1] : []
7458
content {
7559
dynamic "networks" {
76-
for_each = toset(var.private_visibility_config_networks)
60+
for_each = var.private_visibility_config_networks
7761
content {
7862
network_url = networks.value
7963
}
8064
}
81-
82-
dynamic "gke_clusters" {
83-
for_each = toset(var.gke_clusters_list)
84-
content {
85-
gke_cluster_name = gke_clusters.value
86-
}
87-
}
8865
}
8966
}
9067

@@ -110,22 +87,14 @@ resource "google_dns_managed_zone" "private" {
11087
force_destroy = var.force_destroy
11188

11289
dynamic "private_visibility_config" {
113-
for_each = length(var.private_visibility_config_networks) > 0 || length(var.gke_clusters_list) > 0 ? [1] : []
114-
90+
for_each = length(var.private_visibility_config_networks) > 0 ? [1] : []
11591
content {
11692
dynamic "networks" {
117-
for_each = toset(var.private_visibility_config_networks)
93+
for_each = var.private_visibility_config_networks
11894
content {
11995
network_url = networks.value
12096
}
12197
}
122-
123-
dynamic "gke_clusters" {
124-
for_each = toset(var.gke_clusters_list)
125-
content {
126-
gke_cluster_name = gke_clusters.value
127-
}
128-
}
12998
}
13099
}
131100
}
@@ -182,22 +151,14 @@ resource "google_dns_managed_zone" "reverse_lookup" {
182151
reverse_lookup = true
183152

184153
dynamic "private_visibility_config" {
185-
for_each = length(var.private_visibility_config_networks) > 0 || length(var.gke_clusters_list) > 0 ? [1] : []
186-
154+
for_each = length(var.private_visibility_config_networks) > 0 ? [1] : []
187155
content {
188156
dynamic "networks" {
189-
for_each = toset(var.private_visibility_config_networks)
157+
for_each = var.private_visibility_config_networks
190158
content {
191159
network_url = networks.value
192160
}
193161
}
194-
195-
dynamic "gke_clusters" {
196-
for_each = toset(var.gke_clusters_list)
197-
content {
198-
gke_cluster_name = gke_clusters.value
199-
}
200-
}
201162
}
202163
}
203164
}
@@ -214,22 +175,11 @@ resource "google_dns_managed_zone" "service_directory" {
214175
visibility = "private"
215176
force_destroy = var.force_destroy
216177

217-
dynamic "private_visibility_config" {
218-
for_each = length(var.private_visibility_config_networks) > 0 || length(var.gke_clusters_list) > 0 ? [1] : []
219-
220-
content {
221-
dynamic "networks" {
222-
for_each = toset(var.private_visibility_config_networks)
223-
content {
224-
network_url = networks.value
225-
}
226-
}
227-
228-
dynamic "gke_clusters" {
229-
for_each = toset(var.gke_clusters_list)
230-
content {
231-
gke_cluster_name = gke_clusters.value
232-
}
178+
private_visibility_config {
179+
dynamic "networks" {
180+
for_each = var.private_visibility_config_networks
181+
content {
182+
network_url = networks.value
233183
}
234184
}
235185
}
@@ -284,56 +234,3 @@ resource "google_dns_record_set" "cloud-static-records" {
284234
google_dns_managed_zone.public,
285235
]
286236
}
287-
288-
resource "google_dns_managed_zone_iam_policy" "managed_zone_iam_policy" {
289-
count = var.iam_choice == "iam_policy" ? 1 : 0
290-
291-
managed_zone = var.name
292-
project = var.project_id
293-
policy_data = data.google_iam_policy.admin.policy_data
294-
295-
depends_on = [
296-
google_dns_managed_zone.private,
297-
google_dns_managed_zone.public,
298-
google_dns_managed_zone.peering,
299-
google_dns_managed_zone.forwarding,
300-
google_dns_managed_zone.reverse_lookup,
301-
google_dns_managed_zone.service_directory,
302-
]
303-
}
304-
305-
resource "google_dns_managed_zone_iam_binding" "managed_zone_iam_binding" {
306-
count = var.iam_choice == "iam_binding" ? 1 : 0
307-
308-
managed_zone = var.name
309-
members = var.members
310-
role = var.role
311-
project = var.project_id
312-
313-
depends_on = [
314-
google_dns_managed_zone.private,
315-
google_dns_managed_zone.public,
316-
google_dns_managed_zone.peering,
317-
google_dns_managed_zone.forwarding,
318-
google_dns_managed_zone.reverse_lookup,
319-
google_dns_managed_zone.service_directory,
320-
]
321-
}
322-
323-
resource "google_dns_managed_zone_iam_member" "managed_zone_iam_member" {
324-
count = var.iam_choice == "iam_member" ? 1 : 0
325-
326-
managed_zone = var.name
327-
member = var.member
328-
role = var.role
329-
project = var.project_id
330-
331-
depends_on = [
332-
google_dns_managed_zone.private,
333-
google_dns_managed_zone.public,
334-
google_dns_managed_zone.peering,
335-
google_dns_managed_zone.forwarding,
336-
google_dns_managed_zone.reverse_lookup,
337-
google_dns_managed_zone.service_directory,
338-
]
339-
}

0 commit comments

Comments
 (0)