You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -147,7 +147,7 @@ Then perform the following commands on the root folder:
147
147
| firewall\_inbound\_ports | List of TCP ports for admission/webhook controllers. Either flag `add_master_webhook_firewall_rules` or `add_cluster_firewall_rules` (also adds egress rules) must be set to `true` for inbound-ports firewall rules to be applied. |`list(string)`| <pre>[<br> "8443",<br> "9443",<br> "15017"<br>]</pre> | no |
148
148
| firewall\_priority | Priority rule for firewall rules |`number`|`1000`| no |
149
149
| gcloud\_upgrade | Whether to upgrade gcloud at runtime |`bool`|`false`| no |
150
-
| grant\_registry\_access | Grants created cluster-specific service account storage.objectViewer role. |`bool`|`false`| no |
150
+
| grant\_registry\_access | Grants created cluster-specific service account storage.objectViewer and artifactregistry.reader roles. |`bool`|`false`| no |
151
151
| horizontal\_pod\_autoscaling | Enable horizontal pod autoscaling addon |`bool`|`true`| no |
152
152
| http\_load\_balancing | Enable httpload balancer addon |`bool`|`true`| no |
153
153
| identity\_namespace | Workload Identity namespace. (Default value of `enabled` automatically sets project based namespace `[project_id].svc.id.goog`) |`string`|`"enabled"`| no |
@@ -180,7 +180,7 @@ Then perform the following commands on the root folder:
180
180
| project\_id | The project ID to host the cluster in (required) |`string`| n/a | yes |
181
181
| region | The region to host the cluster in (optional if zonal cluster / required if regional) |`string`|`null`| no |
182
182
| regional | Whether is a regional cluster (zonal cluster if set false. WARNING: changing this after cluster creation is destructive!) |`bool`|`true`| no |
183
-
| registry\_project\_ids | Projects holding Google Container Registries. If empty, we use the cluster project. If a service account is created and the `grant_registry_access` variable is set to `true`, the `storage.objectViewer`role is assigned on these projects. |`list(string)`|`[]`| no |
183
+
| registry\_project\_ids | Projects holding Google Container Registries. If empty, we use the cluster project. If a service account is created and the `grant_registry_access` variable is set to `true`, the `storage.objectViewer`and `artifactregsitry.reader` roles are assigned on these projects. |`list(string)`|`[]`| no |
184
184
| release\_channel | The release channel of this cluster. Accepted values are `UNSPECIFIED`, `RAPID`, `REGULAR` and `STABLE`. Defaults to `UNSPECIFIED`. |`string`|`null`| no |
185
185
| remove\_default\_node\_pool | Remove default node pool while setting up the cluster |`bool`|`false`| no |
186
186
| resource\_usage\_export\_dataset\_id | The ID of a BigQuery Dataset for using BigQuery as the destination of resource usage export. |`string`|`""`| no |
description = "Grants created cluster-specific service account storage.objectViewer role."
366
+
description = "Grants created cluster-specific service account storage.objectViewer and artifactregistry.reader roles."
367
367
default = false
368
368
}
369
369
370
370
variable "registry_project_ids" {
371
371
type = list(string)
372
-
description = "Projects holding Google Container Registries. If empty, we use the cluster project. If a service account is created and the `grant_registry_access` variable is set to `true`, the `storage.objectViewer` role is assigned on these projects."
372
+
description = "Projects holding Google Container Registries. If empty, we use the cluster project. If a service account is created and the `grant_registry_access` variable is set to `true`, the `storage.objectViewer` and `artifactregsitry.reader` roles are assigned on these projects."
Copy file name to clipboardExpand all lines: modules/beta-private-cluster-update-variant/README.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -196,7 +196,7 @@ Then perform the following commands on the root folder:
196
196
| firewall\_priority | Priority rule for firewall rules |`number`|`1000`| no |
197
197
| gce\_pd\_csi\_driver | (Beta) Whether this cluster should enable the Google Compute Engine Persistent Disk Container Storage Interface (CSI) Driver. |`bool`|`false`| no |
198
198
| gcloud\_upgrade | Whether to upgrade gcloud at runtime |`bool`|`false`| no |
199
-
| grant\_registry\_access | Grants created cluster-specific service account storage.objectViewer role. |`bool`|`false`| no |
199
+
| grant\_registry\_access | Grants created cluster-specific service account storage.objectViewer and artifactregistry.reader roles. |`bool`|`false`| no |
200
200
| horizontal\_pod\_autoscaling | Enable horizontal pod autoscaling addon |`bool`|`true`| no |
201
201
| http\_load\_balancing | Enable httpload balancer addon |`bool`|`true`| no |
202
202
| identity\_namespace | Workload Identity namespace. (Default value of `enabled` automatically sets project based namespace `[project_id].svc.id.goog`) |`string`|`"enabled"`| no |
@@ -238,7 +238,7 @@ Then perform the following commands on the root folder:
238
238
| project\_id | The project ID to host the cluster in (required) |`string`| n/a | yes |
239
239
| region | The region to host the cluster in (optional if zonal cluster / required if regional) |`string`|`null`| no |
240
240
| regional | Whether is a regional cluster (zonal cluster if set false. WARNING: changing this after cluster creation is destructive!) |`bool`|`true`| no |
241
-
| registry\_project\_ids | Projects holding Google Container Registries. If empty, we use the cluster project. If a service account is created and the `grant_registry_access` variable is set to `true`, the `storage.objectViewer`role is assigned on these projects. |`list(string)`|`[]`| no |
241
+
| registry\_project\_ids | Projects holding Google Container Registries. If empty, we use the cluster project. If a service account is created and the `grant_registry_access` variable is set to `true`, the `storage.objectViewer`and `artifactregsitry.reader` roles are assigned on these projects. |`list(string)`|`[]`| no |
242
242
| release\_channel | The release channel of this cluster. Accepted values are `UNSPECIFIED`, `RAPID`, `REGULAR` and `STABLE`. Defaults to `UNSPECIFIED`. |`string`|`null`| no |
243
243
| remove\_default\_node\_pool | Remove default node pool while setting up the cluster |`bool`|`false`| no |
244
244
| resource\_usage\_export\_dataset\_id | The ID of a BigQuery Dataset for using BigQuery as the destination of resource usage export. |`string`|`""`| no |
description="Grants created cluster-specific service account storage.objectViewer role."
352
+
description="Grants created cluster-specific service account storage.objectViewer and artifactregistry.reader roles."
353
353
default=false
354
354
}
355
355
356
356
variable"registry_project_ids" {
357
357
type=list(string)
358
-
description="Projects holding Google Container Registries. If empty, we use the cluster project. If a service account is created and the `grant_registry_access` variable is set to `true`, the `storage.objectViewer` role is assigned on these projects."
358
+
description="Projects holding Google Container Registries. If empty, we use the cluster project. If a service account is created and the `grant_registry_access` variable is set to `true`, the `storage.objectViewer` and `artifactregsitry.reader` roles are assigned on these projects."
Copy file name to clipboardExpand all lines: modules/beta-private-cluster/README.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -174,7 +174,7 @@ Then perform the following commands on the root folder:
174
174
| firewall\_priority | Priority rule for firewall rules |`number`|`1000`| no |
175
175
| gce\_pd\_csi\_driver | (Beta) Whether this cluster should enable the Google Compute Engine Persistent Disk Container Storage Interface (CSI) Driver. |`bool`|`false`| no |
176
176
| gcloud\_upgrade | Whether to upgrade gcloud at runtime |`bool`|`false`| no |
177
-
| grant\_registry\_access | Grants created cluster-specific service account storage.objectViewer role. |`bool`|`false`| no |
177
+
| grant\_registry\_access | Grants created cluster-specific service account storage.objectViewer and artifactregistry.reader roles. |`bool`|`false`| no |
178
178
| horizontal\_pod\_autoscaling | Enable horizontal pod autoscaling addon |`bool`|`true`| no |
179
179
| http\_load\_balancing | Enable httpload balancer addon |`bool`|`true`| no |
180
180
| identity\_namespace | Workload Identity namespace. (Default value of `enabled` automatically sets project based namespace `[project_id].svc.id.goog`) |`string`|`"enabled"`| no |
@@ -216,7 +216,7 @@ Then perform the following commands on the root folder:
216
216
| project\_id | The project ID to host the cluster in (required) |`string`| n/a | yes |
217
217
| region | The region to host the cluster in (optional if zonal cluster / required if regional) |`string`|`null`| no |
218
218
| regional | Whether is a regional cluster (zonal cluster if set false. WARNING: changing this after cluster creation is destructive!) |`bool`|`true`| no |
219
-
| registry\_project\_ids | Projects holding Google Container Registries. If empty, we use the cluster project. If a service account is created and the `grant_registry_access` variable is set to `true`, the `storage.objectViewer`role is assigned on these projects. |`list(string)`|`[]`| no |
219
+
| registry\_project\_ids | Projects holding Google Container Registries. If empty, we use the cluster project. If a service account is created and the `grant_registry_access` variable is set to `true`, the `storage.objectViewer`and `artifactregsitry.reader` roles are assigned on these projects. |`list(string)`|`[]`| no |
220
220
| release\_channel | The release channel of this cluster. Accepted values are `UNSPECIFIED`, `RAPID`, `REGULAR` and `STABLE`. Defaults to `UNSPECIFIED`. |`string`|`null`| no |
221
221
| remove\_default\_node\_pool | Remove default node pool while setting up the cluster |`bool`|`false`| no |
222
222
| resource\_usage\_export\_dataset\_id | The ID of a BigQuery Dataset for using BigQuery as the destination of resource usage export. |`string`|`""`| no |
description="Grants created cluster-specific service account storage.objectViewer role."
352
+
description="Grants created cluster-specific service account storage.objectViewer and artifactregistry.reader roles."
353
353
default=false
354
354
}
355
355
356
356
variable"registry_project_ids" {
357
357
type=list(string)
358
-
description="Projects holding Google Container Registries. If empty, we use the cluster project. If a service account is created and the `grant_registry_access` variable is set to `true`, the `storage.objectViewer` role is assigned on these projects."
358
+
description="Projects holding Google Container Registries. If empty, we use the cluster project. If a service account is created and the `grant_registry_access` variable is set to `true`, the `storage.objectViewer` and `artifactregsitry.reader` roles are assigned on these projects."
Copy file name to clipboardExpand all lines: modules/beta-public-cluster-update-variant/README.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -187,7 +187,7 @@ Then perform the following commands on the root folder:
187
187
| firewall\_priority | Priority rule for firewall rules |`number`|`1000`| no |
188
188
| gce\_pd\_csi\_driver | (Beta) Whether this cluster should enable the Google Compute Engine Persistent Disk Container Storage Interface (CSI) Driver. |`bool`|`false`| no |
189
189
| gcloud\_upgrade | Whether to upgrade gcloud at runtime |`bool`|`false`| no |
190
-
| grant\_registry\_access | Grants created cluster-specific service account storage.objectViewer role. |`bool`|`false`| no |
190
+
| grant\_registry\_access | Grants created cluster-specific service account storage.objectViewer and artifactregistry.reader roles. |`bool`|`false`| no |
191
191
| horizontal\_pod\_autoscaling | Enable horizontal pod autoscaling addon |`bool`|`true`| no |
192
192
| http\_load\_balancing | Enable httpload balancer addon |`bool`|`true`| no |
193
193
| identity\_namespace | Workload Identity namespace. (Default value of `enabled` automatically sets project based namespace `[project_id].svc.id.goog`) |`string`|`"enabled"`| no |
@@ -227,7 +227,7 @@ Then perform the following commands on the root folder:
227
227
| project\_id | The project ID to host the cluster in (required) |`string`| n/a | yes |
228
228
| region | The region to host the cluster in (optional if zonal cluster / required if regional) |`string`|`null`| no |
229
229
| regional | Whether is a regional cluster (zonal cluster if set false. WARNING: changing this after cluster creation is destructive!) |`bool`|`true`| no |
230
-
| registry\_project\_ids | Projects holding Google Container Registries. If empty, we use the cluster project. If a service account is created and the `grant_registry_access` variable is set to `true`, the `storage.objectViewer`role is assigned on these projects. |`list(string)`|`[]`| no |
230
+
| registry\_project\_ids | Projects holding Google Container Registries. If empty, we use the cluster project. If a service account is created and the `grant_registry_access` variable is set to `true`, the `storage.objectViewer`and `artifactregsitry.reader` roles are assigned on these projects. |`list(string)`|`[]`| no |
231
231
| release\_channel | The release channel of this cluster. Accepted values are `UNSPECIFIED`, `RAPID`, `REGULAR` and `STABLE`. Defaults to `UNSPECIFIED`. |`string`|`null`| no |
232
232
| remove\_default\_node\_pool | Remove default node pool while setting up the cluster |`bool`|`false`| no |
233
233
| resource\_usage\_export\_dataset\_id | The ID of a BigQuery Dataset for using BigQuery as the destination of resource usage export. |`string`|`""`| no |
description="Grants created cluster-specific service account storage.objectViewer role."
352
+
description="Grants created cluster-specific service account storage.objectViewer and artifactregistry.reader roles."
353
353
default=false
354
354
}
355
355
356
356
variable"registry_project_ids" {
357
357
type=list(string)
358
-
description="Projects holding Google Container Registries. If empty, we use the cluster project. If a service account is created and the `grant_registry_access` variable is set to `true`, the `storage.objectViewer` role is assigned on these projects."
358
+
description="Projects holding Google Container Registries. If empty, we use the cluster project. If a service account is created and the `grant_registry_access` variable is set to `true`, the `storage.objectViewer` and `artifactregsitry.reader` roles are assigned on these projects."
Copy file name to clipboardExpand all lines: modules/beta-public-cluster/README.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -165,7 +165,7 @@ Then perform the following commands on the root folder:
165
165
| firewall\_priority | Priority rule for firewall rules |`number`|`1000`| no |
166
166
| gce\_pd\_csi\_driver | (Beta) Whether this cluster should enable the Google Compute Engine Persistent Disk Container Storage Interface (CSI) Driver. |`bool`|`false`| no |
167
167
| gcloud\_upgrade | Whether to upgrade gcloud at runtime |`bool`|`false`| no |
168
-
| grant\_registry\_access | Grants created cluster-specific service account storage.objectViewer role. |`bool`|`false`| no |
168
+
| grant\_registry\_access | Grants created cluster-specific service account storage.objectViewer and artifactregistry.reader roles. |`bool`|`false`| no |
169
169
| horizontal\_pod\_autoscaling | Enable horizontal pod autoscaling addon |`bool`|`true`| no |
170
170
| http\_load\_balancing | Enable httpload balancer addon |`bool`|`true`| no |
171
171
| identity\_namespace | Workload Identity namespace. (Default value of `enabled` automatically sets project based namespace `[project_id].svc.id.goog`) |`string`|`"enabled"`| no |
@@ -205,7 +205,7 @@ Then perform the following commands on the root folder:
205
205
| project\_id | The project ID to host the cluster in (required) |`string`| n/a | yes |
206
206
| region | The region to host the cluster in (optional if zonal cluster / required if regional) |`string`|`null`| no |
207
207
| regional | Whether is a regional cluster (zonal cluster if set false. WARNING: changing this after cluster creation is destructive!) |`bool`|`true`| no |
208
-
| registry\_project\_ids | Projects holding Google Container Registries. If empty, we use the cluster project. If a service account is created and the `grant_registry_access` variable is set to `true`, the `storage.objectViewer`role is assigned on these projects. |`list(string)`|`[]`| no |
208
+
| registry\_project\_ids | Projects holding Google Container Registries. If empty, we use the cluster project. If a service account is created and the `grant_registry_access` variable is set to `true`, the `storage.objectViewer`and `artifactregsitry.reader` roles are assigned on these projects. |`list(string)`|`[]`| no |
209
209
| release\_channel | The release channel of this cluster. Accepted values are `UNSPECIFIED`, `RAPID`, `REGULAR` and `STABLE`. Defaults to `UNSPECIFIED`. |`string`|`null`| no |
210
210
| remove\_default\_node\_pool | Remove default node pool while setting up the cluster |`bool`|`false`| no |
211
211
| resource\_usage\_export\_dataset\_id | The ID of a BigQuery Dataset for using BigQuery as the destination of resource usage export. |`string`|`""`| no |
description="Grants created cluster-specific service account storage.objectViewer role."
352
+
description="Grants created cluster-specific service account storage.objectViewer and artifactregistry.reader roles."
353
353
default=false
354
354
}
355
355
356
356
variable"registry_project_ids" {
357
357
type=list(string)
358
-
description="Projects holding Google Container Registries. If empty, we use the cluster project. If a service account is created and the `grant_registry_access` variable is set to `true`, the `storage.objectViewer` role is assigned on these projects."
358
+
description="Projects holding Google Container Registries. If empty, we use the cluster project. If a service account is created and the `grant_registry_access` variable is set to `true`, the `storage.objectViewer` and `artifactregsitry.reader` roles are assigned on these projects."
0 commit comments