Skip to content

Commit 0961613

Browse files
authored
feat: Expose the grant_registry_access variable in safer-cluster (#509)
Issue: #508
1 parent 92cc19f commit 0961613

File tree

8 files changed

+8
-8
lines changed

8 files changed

+8
-8
lines changed

autogen/safer-cluster/main.tf.tmpl

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -95,7 +95,7 @@ module "gke" {
9595
create_service_account = var.compute_engine_service_account == "" ? true : false
9696
service_account = var.compute_engine_service_account
9797
registry_project_id = var.registry_project_id
98-
grant_registry_access = true
98+
grant_registry_access = var.grant_registry_access
9999

100100
// Basic Auth disabled
101101
basic_auth_username = ""

autogen/safer-cluster/variables.tf.tmpl

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -205,7 +205,7 @@ variable "monitoring_service" {
205205
variable "grant_registry_access" {
206206
type = bool
207207
description = "Grants created cluster-specific service account storage.objectViewer role."
208-
default = false
208+
default = true
209209
}
210210

211211
variable "registry_project_id" {

modules/safer-cluster-update-variant/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -214,7 +214,7 @@ For simplicity, we suggest using `roles/container.admin` and
214214
| enable\_resource\_consumption\_export | Whether to enable resource consumption metering on this cluster. When enabled, a table will be created in the resource export BigQuery dataset to store resource consumption data. The resulting table can be joined with the resource usage table or with BigQuery billing export. | bool | `"true"` | no |
215215
| enable\_shielded\_nodes | Enable Shielded Nodes features on all nodes in this cluster. | bool | `"true"` | no |
216216
| enable\_vertical\_pod\_autoscaling | Vertical Pod Autoscaling automatically adjusts the resources of pods controlled by it | bool | `"false"` | no |
217-
| grant\_registry\_access | Grants created cluster-specific service account storage.objectViewer role. | bool | `"false"` | no |
217+
| grant\_registry\_access | Grants created cluster-specific service account storage.objectViewer role. | bool | `"true"` | no |
218218
| horizontal\_pod\_autoscaling | Enable horizontal pod autoscaling addon | bool | `"true"` | no |
219219
| http\_load\_balancing | Enable httpload balancer addon. The addon allows whoever can create Ingress objects to expose an application to a public IP. Network policies or Gatekeeper policies should be used to verify that only authorized applications are exposed. | bool | `"true"` | no |
220220
| initial\_node\_count | The number of nodes to create in this cluster's default node pool. | number | `"0"` | no |

modules/safer-cluster-update-variant/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,7 @@ module "gke" {
9191
create_service_account = var.compute_engine_service_account == "" ? true : false
9292
service_account = var.compute_engine_service_account
9393
registry_project_id = var.registry_project_id
94-
grant_registry_access = true
94+
grant_registry_access = var.grant_registry_access
9595

9696
// Basic Auth disabled
9797
basic_auth_username = ""

modules/safer-cluster-update-variant/variables.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -205,7 +205,7 @@ variable "monitoring_service" {
205205
variable "grant_registry_access" {
206206
type = bool
207207
description = "Grants created cluster-specific service account storage.objectViewer role."
208-
default = false
208+
default = true
209209
}
210210

211211
variable "registry_project_id" {

modules/safer-cluster/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -214,7 +214,7 @@ For simplicity, we suggest using `roles/container.admin` and
214214
| enable\_resource\_consumption\_export | Whether to enable resource consumption metering on this cluster. When enabled, a table will be created in the resource export BigQuery dataset to store resource consumption data. The resulting table can be joined with the resource usage table or with BigQuery billing export. | bool | `"true"` | no |
215215
| enable\_shielded\_nodes | Enable Shielded Nodes features on all nodes in this cluster. | bool | `"true"` | no |
216216
| enable\_vertical\_pod\_autoscaling | Vertical Pod Autoscaling automatically adjusts the resources of pods controlled by it | bool | `"false"` | no |
217-
| grant\_registry\_access | Grants created cluster-specific service account storage.objectViewer role. | bool | `"false"` | no |
217+
| grant\_registry\_access | Grants created cluster-specific service account storage.objectViewer role. | bool | `"true"` | no |
218218
| horizontal\_pod\_autoscaling | Enable horizontal pod autoscaling addon | bool | `"true"` | no |
219219
| http\_load\_balancing | Enable httpload balancer addon. The addon allows whoever can create Ingress objects to expose an application to a public IP. Network policies or Gatekeeper policies should be used to verify that only authorized applications are exposed. | bool | `"true"` | no |
220220
| initial\_node\_count | The number of nodes to create in this cluster's default node pool. | number | `"0"` | no |

modules/safer-cluster/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,7 @@ module "gke" {
9191
create_service_account = var.compute_engine_service_account == "" ? true : false
9292
service_account = var.compute_engine_service_account
9393
registry_project_id = var.registry_project_id
94-
grant_registry_access = true
94+
grant_registry_access = var.grant_registry_access
9595

9696
// Basic Auth disabled
9797
basic_auth_username = ""

modules/safer-cluster/variables.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -205,7 +205,7 @@ variable "monitoring_service" {
205205
variable "grant_registry_access" {
206206
type = bool
207207
description = "Grants created cluster-specific service account storage.objectViewer role."
208-
default = false
208+
default = true
209209
}
210210

211211
variable "registry_project_id" {

0 commit comments

Comments
 (0)