Skip to content

Commit 0390b7f

Browse files
committed
add support for rbac_binding_config
Signed-off-by: drfaust92 <[email protected]>
1 parent 6538d68 commit 0390b7f

File tree

28 files changed

+47
-47
lines changed

28 files changed

+47
-47
lines changed

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -250,7 +250,7 @@ Then perform the following commands on the root folder:
250250
| parallelstore\_csi\_driver | Whether the Parallelstore CSI driver Addon is enabled for this cluster. | `bool` | `null` | no |
251251
| project\_id | The project ID to host the cluster in (required) | `string` | n/a | yes |
252252
| ray\_operator\_config | The Ray Operator Addon configuration for this cluster. | <pre>object({<br> enabled = bool<br> logging_enabled = optional(bool, false)<br> monitoring_enabled = optional(bool, false)<br> })</pre> | <pre>{<br> "enabled": false,<br> "logging_enabled": false,<br> "monitoring_enabled": false<br>}</pre> | no |
253-
| rbac\_binding\_config | RBACBindingConfig allows user to restrict ClusterRoleBindings an RoleBindings that can be created. | <pre>object({<br> enable_insecure_binding_system_unauthenticated = optional(bool, false)<br> enable_insecure_binding_system_authenticated = optional(bool, false)<br> })</pre> | n/a | yes |
253+
| rbac\_binding\_config | RBACBindingConfig allows user to restrict ClusterRoleBindings an RoleBindings that can be created. | <pre>object({<br> enable_insecure_binding_system_unauthenticated = optional(bool, null)<br> enable_insecure_binding_system_authenticated = optional(bool, null)<br> })</pre> | n/a | yes |
254254
| region | The region to host the cluster in (optional if zonal cluster / required if regional) | `string` | `null` | no |
255255
| regional | Whether is a regional cluster (zonal cluster if set false. WARNING: changing this after cluster creation is destructive!) | `bool` | `true` | no |
256256
| registry\_project\_ids | Projects holding Google Container Registries. If empty, we use the cluster project. If a service account is created and the `grant_registry_access` variable is set to `true`, the `storage.objectViewer` and `artifactregsitry.reader` roles are assigned on these projects. | `list(string)` | `[]` | no |

autogen/main/variables.tf.tmpl

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1152,8 +1152,8 @@ variable "ip_endpoints_enabled" {
11521152

11531153
variable "rbac_binding_config" {
11541154
type = object({
1155-
enable_insecure_binding_system_unauthenticated = optional(bool, false)
1156-
enable_insecure_binding_system_authenticated = optional(bool, false)
1155+
enable_insecure_binding_system_unauthenticated = optional(bool, null)
1156+
enable_insecure_binding_system_authenticated = optional(bool, null)
11571157
})
11581158
description = "RBACBindingConfig allows user to restrict ClusterRoleBindings an RoleBindings that can be created."
11591159
}

metadata.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -758,8 +758,8 @@ spec:
758758
description: RBACBindingConfig allows user to restrict ClusterRoleBindings an RoleBindings that can be created.
759759
varType: |-
760760
object({
761-
enable_insecure_binding_system_unauthenticated = optional(bool, false)
762-
enable_insecure_binding_system_authenticated = optional(bool, false)
761+
enable_insecure_binding_system_unauthenticated = optional(bool, null)
762+
enable_insecure_binding_system_authenticated = optional(bool, null)
763763
})
764764
required: true
765765
outputs:

modules/beta-autopilot-private-cluster/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -147,7 +147,7 @@ Then perform the following commands on the root folder:
147147
| private\_endpoint\_subnetwork | The subnetwork to use for the hosted master network. | `string` | `null` | no |
148148
| project\_id | The project ID to host the cluster in (required) | `string` | n/a | yes |
149149
| ray\_operator\_config | The Ray Operator Addon configuration for this cluster. | <pre>object({<br> enabled = bool<br> logging_enabled = optional(bool, false)<br> monitoring_enabled = optional(bool, false)<br> })</pre> | <pre>{<br> "enabled": false,<br> "logging_enabled": false,<br> "monitoring_enabled": false<br>}</pre> | no |
150-
| rbac\_binding\_config | RBACBindingConfig allows user to restrict ClusterRoleBindings an RoleBindings that can be created. | <pre>object({<br> enable_insecure_binding_system_unauthenticated = optional(bool, false)<br> enable_insecure_binding_system_authenticated = optional(bool, false)<br> })</pre> | n/a | yes |
150+
| rbac\_binding\_config | RBACBindingConfig allows user to restrict ClusterRoleBindings an RoleBindings that can be created. | <pre>object({<br> enable_insecure_binding_system_unauthenticated = optional(bool, null)<br> enable_insecure_binding_system_authenticated = optional(bool, null)<br> })</pre> | n/a | yes |
151151
| region | The region to host the cluster in (optional if zonal cluster / required if regional) | `string` | `null` | no |
152152
| regional | Whether is a regional cluster (zonal cluster if set false. WARNING: changing this after cluster creation is destructive!) | `bool` | `true` | no |
153153
| registry\_project\_ids | Projects holding Google Container Registries. If empty, we use the cluster project. If a service account is created and the `grant_registry_access` variable is set to `true`, the `storage.objectViewer` and `artifactregsitry.reader` roles are assigned on these projects. | `list(string)` | `[]` | no |

modules/beta-autopilot-private-cluster/metadata.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -501,8 +501,8 @@ spec:
501501
description: RBACBindingConfig allows user to restrict ClusterRoleBindings an RoleBindings that can be created.
502502
varType: |-
503503
object({
504-
enable_insecure_binding_system_unauthenticated = optional(bool, false)
505-
enable_insecure_binding_system_authenticated = optional(bool, false)
504+
enable_insecure_binding_system_unauthenticated = optional(bool, null)
505+
enable_insecure_binding_system_authenticated = optional(bool, null)
506506
})
507507
required: true
508508
outputs:

modules/beta-autopilot-private-cluster/variables.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -665,8 +665,8 @@ variable "ip_endpoints_enabled" {
665665

666666
variable "rbac_binding_config" {
667667
type = object({
668-
enable_insecure_binding_system_unauthenticated = optional(bool, false)
669-
enable_insecure_binding_system_authenticated = optional(bool, false)
668+
enable_insecure_binding_system_unauthenticated = optional(bool, null)
669+
enable_insecure_binding_system_authenticated = optional(bool, null)
670670
})
671671
description = "RBACBindingConfig allows user to restrict ClusterRoleBindings an RoleBindings that can be created."
672672
}

modules/beta-autopilot-public-cluster/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -135,7 +135,7 @@ Then perform the following commands on the root folder:
135135
| notification\_filter\_event\_type | Choose what type of notifications you want to receive. If no filters are applied, you'll receive all notification types. Can be used to filter what notifications are sent. Accepted values are UPGRADE\_AVAILABLE\_EVENT, UPGRADE\_EVENT, and SECURITY\_BULLETIN\_EVENT. | `list(string)` | `[]` | no |
136136
| project\_id | The project ID to host the cluster in (required) | `string` | n/a | yes |
137137
| ray\_operator\_config | The Ray Operator Addon configuration for this cluster. | <pre>object({<br> enabled = bool<br> logging_enabled = optional(bool, false)<br> monitoring_enabled = optional(bool, false)<br> })</pre> | <pre>{<br> "enabled": false,<br> "logging_enabled": false,<br> "monitoring_enabled": false<br>}</pre> | no |
138-
| rbac\_binding\_config | RBACBindingConfig allows user to restrict ClusterRoleBindings an RoleBindings that can be created. | <pre>object({<br> enable_insecure_binding_system_unauthenticated = optional(bool, false)<br> enable_insecure_binding_system_authenticated = optional(bool, false)<br> })</pre> | n/a | yes |
138+
| rbac\_binding\_config | RBACBindingConfig allows user to restrict ClusterRoleBindings an RoleBindings that can be created. | <pre>object({<br> enable_insecure_binding_system_unauthenticated = optional(bool, null)<br> enable_insecure_binding_system_authenticated = optional(bool, null)<br> })</pre> | n/a | yes |
139139
| region | The region to host the cluster in (optional if zonal cluster / required if regional) | `string` | `null` | no |
140140
| regional | Whether is a regional cluster (zonal cluster if set false. WARNING: changing this after cluster creation is destructive!) | `bool` | `true` | no |
141141
| registry\_project\_ids | Projects holding Google Container Registries. If empty, we use the cluster project. If a service account is created and the `grant_registry_access` variable is set to `true`, the `storage.objectViewer` and `artifactregsitry.reader` roles are assigned on these projects. | `list(string)` | `[]` | no |

modules/beta-autopilot-public-cluster/metadata.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -479,8 +479,8 @@ spec:
479479
description: RBACBindingConfig allows user to restrict ClusterRoleBindings an RoleBindings that can be created.
480480
varType: |-
481481
object({
482-
enable_insecure_binding_system_unauthenticated = optional(bool, false)
483-
enable_insecure_binding_system_authenticated = optional(bool, false)
482+
enable_insecure_binding_system_unauthenticated = optional(bool, null)
483+
enable_insecure_binding_system_authenticated = optional(bool, null)
484484
})
485485
required: true
486486
outputs:

modules/beta-autopilot-public-cluster/variables.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -629,8 +629,8 @@ variable "ip_endpoints_enabled" {
629629

630630
variable "rbac_binding_config" {
631631
type = object({
632-
enable_insecure_binding_system_unauthenticated = optional(bool, false)
633-
enable_insecure_binding_system_authenticated = optional(bool, false)
632+
enable_insecure_binding_system_unauthenticated = optional(bool, null)
633+
enable_insecure_binding_system_authenticated = optional(bool, null)
634634
})
635635
description = "RBACBindingConfig allows user to restrict ClusterRoleBindings an RoleBindings that can be created."
636636
}

modules/beta-private-cluster-update-variant/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -295,7 +295,7 @@ Then perform the following commands on the root folder:
295295
| private\_endpoint\_subnetwork | The subnetwork to use for the hosted master network. | `string` | `null` | no |
296296
| project\_id | The project ID to host the cluster in (required) | `string` | n/a | yes |
297297
| ray\_operator\_config | The Ray Operator Addon configuration for this cluster. | <pre>object({<br> enabled = bool<br> logging_enabled = optional(bool, false)<br> monitoring_enabled = optional(bool, false)<br> })</pre> | <pre>{<br> "enabled": false,<br> "logging_enabled": false,<br> "monitoring_enabled": false<br>}</pre> | no |
298-
| rbac\_binding\_config | RBACBindingConfig allows user to restrict ClusterRoleBindings an RoleBindings that can be created. | <pre>object({<br> enable_insecure_binding_system_unauthenticated = optional(bool, false)<br> enable_insecure_binding_system_authenticated = optional(bool, false)<br> })</pre> | n/a | yes |
298+
| rbac\_binding\_config | RBACBindingConfig allows user to restrict ClusterRoleBindings an RoleBindings that can be created. | <pre>object({<br> enable_insecure_binding_system_unauthenticated = optional(bool, null)<br> enable_insecure_binding_system_authenticated = optional(bool, null)<br> })</pre> | n/a | yes |
299299
| region | The region to host the cluster in (optional if zonal cluster / required if regional) | `string` | `null` | no |
300300
| regional | Whether is a regional cluster (zonal cluster if set false. WARNING: changing this after cluster creation is destructive!) | `bool` | `true` | no |
301301
| registry\_project\_ids | Projects holding Google Container Registries. If empty, we use the cluster project. If a service account is created and the `grant_registry_access` variable is set to `true`, the `storage.objectViewer` and `artifactregsitry.reader` roles are assigned on these projects. | `list(string)` | `[]` | no |

0 commit comments

Comments
 (0)