You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CHANGELOG.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,6 +15,7 @@ Extending the adopted spec, each change should have a link to its corresponding
15
15
### Added
16
16
17
17
* Added [private](https://github.com/terraform-google-modules/terraform-google-kubernetes-engine/tree/master/modules/private-cluster-update-variant) and [beta private](https://github.com/terraform-google-modules/terraform-google-kubernetes-engine/tree/master/modules/beta-private-cluster-update-variant) variants which allow node pools to be created before being destroyed. [#256]
18
+
* Add a parameter `registry_project_id` to allow connecting to registries in other projects. [#273]
18
19
19
20
## [v5.0.0] - 2019-09-25
20
21
v5.0.0 is a backwards-incompatible release. Please see the [upgrading guide](./docs/upgrading_to_v5.0.md).
@@ -204,6 +205,7 @@ In either case, upgrading to module version `v1.0.0` will trigger a recreation o
Copy file name to clipboardExpand all lines: README.md
+4Lines changed: 4 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -167,6 +167,7 @@ In either case, upgrading to module version `v1.0.0` will trigger a recreation o
167
167
| project\_id | The project ID to host the cluster in (required) | string | n/a | yes |
168
168
| region | The region to host the cluster in (optional if zonal cluster / required if regional) | string |`"null"`| no |
169
169
| regional | Whether is a regional cluster (zonal cluster if set false. WARNING: changing this after cluster creation is destructive!) | bool |`"true"`| no |
170
+
| registry\_project\_id | Project holding the Google Container Registry. If empty, we use the cluster project. If grant_registry_access is true, storage.objectViewer role is assigned on this project. | string |`""`| no |
170
171
| remove\_default\_node\_pool | Remove default node pool while setting up the cluster | bool |`"false"`| no |
171
172
| service\_account | The service account to run nodes as if not overridden in `node_pools`. The create_service_account variable default value (true) will cause a cluster-specific service account to be created. | string |`""`| no |
172
173
| stub\_domains | Map of stub domains and their resolvers to forward DNS queries for a certain domain to an external DNS server | map(list(string)) |`<map>`| no |
@@ -228,6 +229,9 @@ following project roles:
228
229
- roles/iam.serviceAccountUser
229
230
- roles/resourcemanager.projectIamAdmin (only required if `service_account` is set to `create`)
230
231
232
+
Additionally, if `service_account` is set to `create` and `grant_registry_access` is requested, the service account requires the following role on the `registry_project_id` project:
233
+
- roles/resourcemanager.projectIamAdmin
234
+
231
235
### Enable APIs
232
236
In order to operate with the Service Account you must activate the following APIs on the project where the Service Account was created:
Copy file name to clipboardExpand all lines: autogen/README.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -269,6 +269,9 @@ following project roles:
269
269
- roles/iam.serviceAccountUser
270
270
- roles/resourcemanager.projectIamAdmin (only required if `service_account` is set to `create`)
271
271
272
+
Additionally, if `service_account` is set to `create` and `grant_registry_access` is requested, the service account requires the following role on the `registry_project_id` project:
273
+
- roles/resourcemanager.projectIamAdmin
274
+
272
275
### Enable APIs
273
276
In order to operate with the Service Account you must activate the following APIs on the project where the Service Account was created:
description ="Project holding the Google Container Registry. If empty, we use the cluster project. If grant_registry_access is true, storage.objectViewer role is assigned on this project."
276
+
default =""
277
+
}
278
+
273
279
variable "service_account" {
274
280
type =string
275
281
description ="The service account to run nodes as if not overridden in `node_pools`. The create_service_account variable default value (true) will cause a cluster-specific service account to be created."
0 commit comments