Skip to content

Commit 2db4ae7

Browse files
authored
Merge branch 'main' into safer-clusters-missing-variables
2 parents 49f136d + 2c8b78d commit 2db4ae7

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

73 files changed

+391
-80
lines changed

CHANGELOG.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,18 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
66

77
Extending the adopted spec, each change should have a link to its corresponding pull request appended.
88

9+
## [38.1.0](https://github.com/terraform-google-modules/terraform-google-kubernetes-engine/compare/v38.0.1...v38.1.0) (2025-08-29)
10+
11+
12+
### Features
13+
14+
* **deps:** Update Terraform Google Provider to v7 (major) ([#2425](https://github.com/terraform-google-modules/terraform-google-kubernetes-engine/issues/2425)) ([6967a8f](https://github.com/terraform-google-modules/terraform-google-kubernetes-engine/commit/6967a8f2658073959a866b4b638c4e950802eb04))
15+
16+
17+
### Bug Fixes
18+
19+
* note org support of Identity Service for GKE ([#2422](https://github.com/terraform-google-modules/terraform-google-kubernetes-engine/issues/2422)) ([893ba59](https://github.com/terraform-google-modules/terraform-google-kubernetes-engine/commit/893ba597d38bef0bc6a47a5d2a37c802f7ce749d))
20+
921
## [38.0.1](https://github.com/terraform-google-modules/terraform-google-kubernetes-engine/compare/v38.0.0...v38.0.1) (2025-08-22)
1022

1123

README.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -250,6 +250,7 @@ Then perform the following commands on the root folder:
250250
| parallelstore\_csi\_driver | Whether the Parallelstore CSI driver Addon is enabled for this cluster. | `bool` | `null` | no |
251251
| project\_id | The project ID to host the cluster in (required) | `string` | n/a | yes |
252252
| ray\_operator\_config | The Ray Operator Addon configuration for this cluster. | <pre>object({<br> enabled = bool<br> logging_enabled = optional(bool, false)<br> monitoring_enabled = optional(bool, false)<br> })</pre> | <pre>{<br> "enabled": false,<br> "logging_enabled": false,<br> "monitoring_enabled": false<br>}</pre> | no |
253+
| rbac\_binding\_config | RBACBindingConfig allows user to restrict ClusterRoleBindings an RoleBindings that can be created. | <pre>object({<br> enable_insecure_binding_system_unauthenticated = optional(bool, null)<br> enable_insecure_binding_system_authenticated = optional(bool, null)<br> })</pre> | <pre>{<br> "enable_insecure_binding_system_authenticated": null,<br> "enable_insecure_binding_system_unauthenticated": null<br>}</pre> | no |
253254
| region | The region to host the cluster in (optional if zonal cluster / required if regional) | `string` | `null` | no |
254255
| regional | Whether is a regional cluster (zonal cluster if set false. WARNING: changing this after cluster creation is destructive!) | `bool` | `true` | no |
255256
| registry\_project\_ids | Projects holding Google Container Registries. If empty, we use the cluster project. If a service account is created and the `grant_registry_access` variable is set to `true`, the `storage.objectViewer` and `artifactregsitry.reader` roles are assigned on these projects. | `list(string)` | `[]` | no |

autogen/main/cluster.tf.tmpl

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -274,6 +274,14 @@ resource "google_container_cluster" "primary" {
274274
}
275275
}
276276

277+
dynamic "rbac_binding_config" {
278+
for_each = var.rbac_binding_config.enable_insecure_binding_system_unauthenticated != null || var.rbac_binding_config.enable_insecure_binding_system_authenticated != null ? [var.rbac_binding_config] : []
279+
content {
280+
enable_insecure_binding_system_unauthenticated = rbac_binding_config.value["enable_insecure_binding_system_unauthenticated"]
281+
enable_insecure_binding_system_authenticated = rbac_binding_config.value["enable_insecure_binding_system_authenticated"]
282+
}
283+
}
284+
277285
dynamic "secret_manager_config" {
278286
for_each = var.enable_secret_manager_addon ? [var.enable_secret_manager_addon] : []
279287
content {

autogen/main/variables.tf.tmpl

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1149,3 +1149,15 @@ variable "ip_endpoints_enabled" {
11491149
type = bool
11501150
default = null
11511151
}
1152+
1153+
variable "rbac_binding_config" {
1154+
type = object({
1155+
enable_insecure_binding_system_unauthenticated = optional(bool, null)
1156+
enable_insecure_binding_system_authenticated = optional(bool, null)
1157+
})
1158+
description = "RBACBindingConfig allows user to restrict ClusterRoleBindings an RoleBindings that can be created."
1159+
default = {
1160+
enable_insecure_binding_system_unauthenticated = null
1161+
enable_insecure_binding_system_authenticated = null
1162+
}
1163+
}

autogen/main/versions.tf.tmpl

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -24,33 +24,33 @@ terraform {
2424
required_providers {
2525
google = {
2626
source = "hashicorp/google"
27-
version = ">= 6.42.0, < 8"
27+
version = ">= 6.47.0, < 8"
2828
}
2929
google-beta = {
3030
source = "hashicorp/google-beta"
31-
version = ">= 6.42.0, < 8"
31+
version = ">= 6.47.0, < 8"
3232
}
3333
{% elif beta_cluster and autopilot_cluster %}
3434
required_providers {
3535
google = {
3636
source = "hashicorp/google"
37-
version = ">= 6.42.0, < 8"
37+
version = ">= 6.47.0, < 8"
3838
}
3939
google-beta = {
4040
source = "hashicorp/google-beta"
41-
version = ">= 6.42.0, < 8"
41+
version = ">= 6.47.0, < 8"
4242
}
4343
{% elif autopilot_cluster %}
4444
required_providers {
4545
google = {
4646
source = "hashicorp/google"
47-
version = ">= 6.42.0, < 8"
47+
version = ">= 6.47.0, < 8"
4848
}
4949
{% else %}
5050
required_providers {
5151
google = {
5252
source = "hashicorp/google"
53-
version = ">= 6.42.0, < 8"
53+
version = ">= 6.47.0, < 8"
5454
}
5555
{% endif %}
5656
kubernetes = {
@@ -63,6 +63,6 @@ terraform {
6363
}
6464
}
6565
provider_meta "{% if beta_cluster %}google-beta{% else %}google{% endif %}" {
66-
module_name = "blueprints/terraform/terraform-google-kubernetes-engine{% if module_registry_name %}:{{ module_registry_name }}{% endif %}/v38.0.1"
66+
module_name = "blueprints/terraform/terraform-google-kubernetes-engine{% if module_registry_name %}:{{ module_registry_name }}{% endif %}/v38.1.0"
6767
}
6868
}

autogen/safer-cluster/versions.tf.tmpl

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,6 +23,6 @@ terraform {
2323
required_version = ">=1.3"
2424

2525
provider_meta "google-beta" {
26-
module_name = "blueprints/terraform/terraform-google-kubernetes-engine{% if module_registry_name %}:{{ module_registry_name }}{% endif %}/v38.0.1"
26+
module_name = "blueprints/terraform/terraform-google-kubernetes-engine{% if module_registry_name %}:{{ module_registry_name }}{% endif %}/v38.1.0"
2727
}
2828
}

cluster.tf

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -213,6 +213,14 @@ resource "google_container_cluster" "primary" {
213213
}
214214
}
215215

216+
dynamic "rbac_binding_config" {
217+
for_each = var.rbac_binding_config.enable_insecure_binding_system_unauthenticated != null || var.rbac_binding_config.enable_insecure_binding_system_authenticated != null ? [var.rbac_binding_config] : []
218+
content {
219+
enable_insecure_binding_system_unauthenticated = rbac_binding_config.value["enable_insecure_binding_system_unauthenticated"]
220+
enable_insecure_binding_system_authenticated = rbac_binding_config.value["enable_insecure_binding_system_authenticated"]
221+
}
222+
}
223+
216224
dynamic "secret_manager_config" {
217225
for_each = var.enable_secret_manager_addon ? [var.enable_secret_manager_addon] : []
218226
content {

metadata.yaml

Lines changed: 12 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ spec:
2424
source:
2525
repo: https://github.com/terraform-google-modules/terraform-google-kubernetes-engine.git
2626
sourceType: git
27-
version: 38.0.1
27+
version: 38.1.0
2828
actuationTool:
2929
flavor: Terraform
3030
version: ">=1.3"
@@ -754,6 +754,16 @@ spec:
754754
- name: ip_endpoints_enabled
755755
description: (Optional) Controls whether to allow direct IP access. Defaults to `true`.
756756
varType: bool
757+
- name: rbac_binding_config
758+
description: RBACBindingConfig allows user to restrict ClusterRoleBindings an RoleBindings that can be created.
759+
varType: |-
760+
object({
761+
enable_insecure_binding_system_unauthenticated = optional(bool, null)
762+
enable_insecure_binding_system_authenticated = optional(bool, null)
763+
})
764+
defaultValue:
765+
enable_insecure_binding_system_authenticated: null
766+
enable_insecure_binding_system_unauthenticated: null
757767
outputs:
758768
- name: ca_certificate
759769
description: Cluster ca certificate (base64 encoded)
@@ -826,7 +836,7 @@ spec:
826836
- roles/editor
827837
providerVersions:
828838
- source: hashicorp/google
829-
version: ">= 6.42.0, < 8"
839+
version: ">= 6.47.0, < 8"
830840
- source: hashicorp/kubernetes
831841
version: ~> 2.10
832842
- source: hashicorp/random

modules/auth/metadata.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ spec:
2525
repo: https://github.com/terraform-google-modules/terraform-google-kubernetes-engine.git
2626
sourceType: git
2727
dir: /modules/auth
28-
version: 38.0.1
28+
version: 38.1.0
2929
actuationTool:
3030
flavor: Terraform
3131
version: ">= 1.3"

modules/auth/versions.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,6 +26,6 @@ terraform {
2626
}
2727

2828
provider_meta "google" {
29-
module_name = "blueprints/terraform/terraform-google-kubernetes-engine:auth/v38.0.1"
29+
module_name = "blueprints/terraform/terraform-google-kubernetes-engine:auth/v38.1.0"
3030
}
3131
}

0 commit comments

Comments
 (0)