Skip to content

Commit 186fd07

Browse files
authored
Merge branch 'master' into master
2 parents 140112a + caa194f commit 186fd07

File tree

21 files changed

+97
-87
lines changed

21 files changed

+97
-87
lines changed

.gitignore

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -37,6 +37,9 @@ Session.vim
3737
# tf lock file
3838
.terraform.lock.hcl
3939

40+
# Top level lock used by the test tooling
41+
/.terraform.lock
42+
4043
# Crash log files
4144
crash.log
4245

.kitchen.yml

Lines changed: 28 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -14,12 +14,15 @@
1414
---
1515
driver:
1616
name: "terraform"
17-
command_timeout: 2700
1817
verify_version: false
1918

2019
provisioner:
2120
name: "terraform"
2221

22+
transport:
23+
name: "terraform"
24+
command_timeout: 2700
25+
2326
verifier:
2427
name: terraform
2528
color: false
@@ -30,14 +33,14 @@ platforms:
3033

3134
suites:
3235
- name: "shared_vpc"
33-
driver:
36+
transport:
3437
root_module_directory: test/fixtures/shared_vpc
3538
verifier:
3639
systems:
3740
- name: shared_vpc
3841
backend: local
3942
- name: "safer_cluster"
40-
driver:
43+
transport:
4144
root_module_directory: test/fixtures/safer_cluster
4245
verifier:
4346
systems:
@@ -50,14 +53,14 @@ suites:
5053
controls:
5154
- network
5255
- name: "simple_regional"
53-
driver:
56+
transport:
5457
root_module_directory: test/fixtures/simple_regional
5558
verifier:
5659
systems:
5760
- name: simple_regional
5861
backend: local
5962
- name: "simple_regional_with_networking"
60-
driver:
63+
transport:
6164
root_module_directory: test/fixtures/simple_regional_with_networking
6265
verifier:
6366
systems:
@@ -74,35 +77,35 @@ suites:
7477
controls:
7578
- network
7679
- name: "simple_regional_private"
77-
driver:
80+
transport:
7881
root_module_directory: test/fixtures/simple_regional_private
7982
verifier:
8083
systems:
8184
- name: simple_regional_private
8285
backend: local
8386
- name: "simple_regional_with_gateway_api"
84-
driver:
87+
transport:
8588
root_module_directory: test/fixtures/simple_regional_with_gateway_api
8689
verifier:
8790
systems:
8891
- name: simple_regional_with_gateway_api
8992
backend: local
9093
- name: "simple_regional_with_ipv6"
91-
driver:
94+
transport:
9295
root_module_directory: test/fixtures/simple_regional_with_ipv6
9396
verifier:
9497
systems:
9598
- name: simple_regional_with_ipv6
9699
backend: local
97100
- name: "simple_regional_with_kubeconfig"
98-
driver:
101+
transport:
99102
root_module_directory: test/fixtures/simple_regional_with_kubeconfig
100103
verifier:
101104
systems:
102105
- name: simple_regional_with_kubeconfig
103106
backend: local
104107
- name: "simple_zonal"
105-
driver:
108+
transport:
106109
root_module_directory: test/fixtures/simple_zonal
107110
verifier:
108111
systems:
@@ -116,7 +119,7 @@ suites:
116119
controls:
117120
- gcp
118121
- name: "simple_zonal_private"
119-
driver:
122+
transport:
120123
root_module_directory: test/fixtures/simple_zonal_private
121124
verifier:
122125
systems:
@@ -125,7 +128,7 @@ suites:
125128
controls:
126129
- gcloud
127130
- name: "stub_domains"
128-
driver:
131+
transport:
129132
root_module_directory: test/fixtures/stub_domains
130133
verifier:
131134
systems:
@@ -137,27 +140,27 @@ suites:
137140
# Disabled due to issue #264
138141
# (https://github.com/terraform-google-modules/terraform-google-kubernetes-engine/issues/264)
139142
# - name: stub_domains_private
140-
# driver:
143+
# transport:
141144
# root_module_directory: test/fixtures/stub_domains_private
142145
# systems:
143146
# - name: stub_domains_private
144147
# backend: local
145148
- name: "upstream_nameservers"
146-
driver:
149+
transport:
147150
root_module_directory: test/fixtures/upstream_nameservers
148151
verifier:
149152
systems:
150153
- name: upstream_nameservers
151154
backend: local
152155
- name: "stub_domains_upstream_nameservers"
153-
driver:
156+
transport:
154157
root_module_directory: test/fixtures/stub_domains_upstream_nameservers
155158
verifier:
156159
systems:
157160
- name: stub_domains_upstream_nameservers
158161
backend: local
159162
- name: "workload_identity"
160-
driver:
163+
transport:
161164
root_module_directory: test/fixtures/workload_identity
162165
verifier:
163166
systems:
@@ -170,14 +173,14 @@ suites:
170173
controls:
171174
- gcp
172175
- name: "workload_metadata_config"
173-
driver:
176+
transport:
174177
root_module_directory: test/fixtures/workload_metadata_config
175178
verifier:
176179
systems:
177180
- name: workload_metadata_config
178181
backend: local
179182
- name: "simple_windows_node_pool"
180-
driver:
183+
transport:
181184
root_module_directory: test/fixtures/simple_windows_node_pool
182185
verifier:
183186
systems:
@@ -190,7 +193,7 @@ suites:
190193
controls:
191194
- gcp
192195
- name: "deploy_service"
193-
driver:
196+
transport:
194197
root_module_directory: test/fixtures/deploy_service
195198
verifier:
196199
systems:
@@ -200,7 +203,7 @@ suites:
200203
- gcloud
201204
- kubectl
202205
- name: "node_pool"
203-
driver:
206+
transport:
204207
root_module_directory: test/fixtures/node_pool
205208
verifier:
206209
systems:
@@ -210,21 +213,21 @@ suites:
210213
- gcloud
211214
- kubectl
212215
- name: "sandbox_enabled"
213-
driver:
216+
transport:
214217
root_module_directory: test/fixtures/sandbox_enabled
215218
verifier:
216219
systems:
217220
- name: sandbox_enabled
218221
backend: local
219222
- name: "safer_cluster_iap_bastion"
220-
driver:
223+
transport:
221224
root_module_directory: test/fixtures/safer_cluster_iap_bastion
222225
verifier:
223226
systems:
224227
- name: safer_cluster_iap_bastion
225228
backend: local
226229
- name: "simple_zonal_with_asm"
227-
driver:
230+
transport:
228231
root_module_directory: test/fixtures/simple_zonal_with_asm
229232
verifier:
230233
systems:
@@ -234,14 +237,14 @@ suites:
234237
- gcloud
235238
- kubectl
236239
- name: "simple_autopilot_private"
237-
driver:
240+
transport:
238241
root_module_directory: test/fixtures/simple_autopilot_private
239242
verifier:
240243
systems:
241244
- name: simple_autopilot_private
242245
backend: local
243246
- name: "simple_autopilot_public"
244-
driver:
247+
transport:
245248
root_module_directory: test/fixtures/simple_autopilot_public
246249
verifier:
247250
systems:

autogen/main/cluster.tf.tmpl

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -184,9 +184,9 @@ resource "google_container_cluster" "primary" {
184184
dynamic "resource_limits" {
185185
for_each = local.autoscaling_resource_limits
186186
content {
187-
resource_type = lookup(resource_limits.value, "resource_type")
188-
minimum = lookup(resource_limits.value, "minimum")
189-
maximum = lookup(resource_limits.value, "maximum")
187+
resource_type = resource_limits.value["resource_type"]
188+
minimum = resource_limits.value["minimum"]
189+
maximum = resource_limits.value["maximum"]
190190
}
191191
}
192192
}
@@ -598,7 +598,7 @@ resource "google_container_cluster" "primary" {
598598
content {
599599
enable_private_endpoint = private_cluster_config.value.enable_private_endpoint
600600
enable_private_nodes = private_cluster_config.value.enable_private_nodes
601-
master_ipv4_cidr_block = private_cluster_config.value.master_ipv4_cidr_block
601+
master_ipv4_cidr_block = var.private_endpoint_subnetwork == null ? private_cluster_config.value.master_ipv4_cidr_block : null
602602
private_endpoint_subnetwork = private_cluster_config.value.private_endpoint_subnetwork
603603
dynamic "master_global_access_config" {
604604
for_each = var.master_global_access_enabled ? [var.master_global_access_enabled] : []
@@ -888,7 +888,7 @@ resource "google_container_node_pool" "windows_pools" {
888888
min_cpu_platform = lookup(each.value, "min_cpu_platform", "")
889889
enable_confidential_storage = lookup(each.value, "enable_confidential_storage", false)
890890
dynamic "gcfs_config" {
891-
for_each = lookup(each.value, "enable_gcfs", false) ? [true] : [false]
891+
for_each = lookup(each.value, "enable_gcfs", null ) !=null ? [each.value.enable_gcfs] : []
892892
content {
893893
enabled = gcfs_config.value
894894
}

autogen/main/versions.tf.tmpl

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -47,12 +47,12 @@ terraform {
4747
google = {
4848
source = "hashicorp/google"
4949
# Workaround for https://github.com/hashicorp/terraform-provider-google/issues/19428
50-
version = ">= 5.40.0, != 5.44.0, < 6.2.0, < 7"
50+
version = ">= 5.40.0, != 5.44.0, != 6.2.0, != 6.3.0, < 7"
5151
}
5252
google-beta = {
5353
source = "hashicorp/google-beta"
5454
# Workaround for https://github.com/hashicorp/terraform-provider-google/issues/19428
55-
version = ">= 5.40.0, != 5.44.0, < 6.2.0, < 7"
55+
version = ">= 5.40.0, != 5.44.0, != 6.2.0, != 6.3.0, < 7"
5656
}
5757
kubernetes = {
5858
source = "hashicorp/kubernetes"
@@ -71,7 +71,7 @@ terraform {
7171
google = {
7272
source = "hashicorp/google"
7373
# Workaround for https://github.com/hashicorp/terraform-provider-google/issues/19428
74-
version = ">= 5.40.0, != 5.44.0, < 6.2.0, < 7"
74+
version = ">= 5.40.0, != 5.44.0, != 6.2.0, != 6.3.0, < 7"
7575
}
7676
kubernetes = {
7777
source = "hashicorp/kubernetes"

cluster.tf

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -154,9 +154,9 @@ resource "google_container_cluster" "primary" {
154154
dynamic "resource_limits" {
155155
for_each = local.autoscaling_resource_limits
156156
content {
157-
resource_type = lookup(resource_limits.value, "resource_type")
158-
minimum = lookup(resource_limits.value, "minimum")
159-
maximum = lookup(resource_limits.value, "maximum")
157+
resource_type = resource_limits.value["resource_type"]
158+
minimum = resource_limits.value["minimum"]
159+
maximum = resource_limits.value["maximum"]
160160
}
161161
}
162162
}
@@ -594,7 +594,7 @@ resource "google_container_node_pool" "pools" {
594594
min_cpu_platform = lookup(each.value, "min_cpu_platform", "")
595595
enable_confidential_storage = lookup(each.value, "enable_confidential_storage", false)
596596
dynamic "gcfs_config" {
597-
for_each = lookup(each.value, "enable_gcfs", false) ? [true] : [false]
597+
for_each = lookup(each.value, "enable_gcfs", null) != null ? [each.value.enable_gcfs] : []
598598
content {
599599
enabled = gcfs_config.value
600600
}
@@ -876,7 +876,7 @@ resource "google_container_node_pool" "windows_pools" {
876876
min_cpu_platform = lookup(each.value, "min_cpu_platform", "")
877877
enable_confidential_storage = lookup(each.value, "enable_confidential_storage", false)
878878
dynamic "gcfs_config" {
879-
for_each = lookup(each.value, "enable_gcfs", false) ? [true] : [false]
879+
for_each = lookup(each.value, "enable_gcfs", null) != null ? [each.value.enable_gcfs] : []
880880
content {
881881
enabled = gcfs_config.value
882882
}

examples/autopilot_private_firewalls/main.tf

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,9 @@ provider "kubernetes" {
3333
}
3434

3535
module "gke" {
36-
source = "../../modules/beta-autopilot-private-cluster/"
36+
source = "terraform-google-modules/kubernetes-engine/google//modules/beta-autopilot-private-cluster"
37+
version = "~> 33.0"
38+
3739
project_id = var.project_id
3840
name = "${local.cluster_type}-cluster"
3941
regional = true

examples/simple_autopilot_private/network.tf

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -23,9 +23,10 @@ module "gcp-network" {
2323

2424
subnets = [
2525
{
26-
subnet_name = local.subnet_name
27-
subnet_ip = "10.0.0.0/17"
28-
subnet_region = var.region
26+
subnet_name = local.subnet_name
27+
subnet_ip = "10.0.0.0/17"
28+
subnet_region = var.region
29+
subnet_private_access = true
2930
},
3031
{
3132
subnet_name = local.master_auth_subnetwork

examples/simple_fleet_app_operator_permissions/main.tf

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,8 @@ resource "google_gke_hub_scope" "scope" {
3535

3636
# Grant permissions to the app operator to work with the Fleet Scope.
3737
module "permissions" {
38-
source = "../../modules/fleet-app-operator-permissions"
38+
source = "terraform-google-modules/kubernetes-engine/google//modules/fleet-app-operator-permissions"
39+
version = "~> 33.0"
3940

4041
fleet_project_id = var.fleet_project_id
4142
scope_id = google_gke_hub_scope.scope.scope_id

examples/simple_regional_with_ipv6/main.tf

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,9 @@ provider "kubernetes" {
2727
}
2828

2929
module "gke" {
30-
source = "terraform-google-modules/kubernetes-engine/google"
30+
source = "terraform-google-modules/kubernetes-engine/google"
31+
version = "~> 33.0"
32+
3133
project_id = var.project_id
3234
name = "${local.cluster_type}-cluster${var.cluster_name_suffix}"
3335
regional = true

modules/acm/feature.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ resource "google_gke_hub_feature_membership" "main" {
2929
google_gke_hub_feature.acm
3030
]
3131

32-
location = "global"
32+
location = module.registration.location
3333
feature = "configmanagement"
3434

3535
membership = module.registration.cluster_membership_id

0 commit comments

Comments
 (0)