Skip to content

Commit d8c38a5

Browse files
committed
update autopilot block name
1 parent d48dda7 commit d8c38a5

File tree

3 files changed

+3
-3
lines changed

3 files changed

+3
-3
lines changed

autogen/main/cluster.tf.tmpl

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -272,7 +272,7 @@ resource "google_container_cluster" "primary" {
272272
dynamic "node_pool_auto_config" {
273273
for_each = length(var.network_tags) > 0 || var.add_cluster_firewall_rules || var.add_master_webhook_firewall_rules || var.add_shadow_firewall_rules || var.insecure_kubelet_readonly_port_enabled !="" ? [1] : []
274274
content {
275-
dynamic "kubelet_config" {
275+
dynamic "node_kubelet_config" {
276276
for_each = var.insecure_kubelet_readonly_port_enabled != "" ? [1] : []
277277
insecure_kubelet_readonly_port_enabled = var.insecure_kubelet_readonly_port_enabled
278278
}

modules/beta-autopilot-private-cluster/cluster.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -120,7 +120,7 @@ resource "google_container_cluster" "primary" {
120120
dynamic "node_pool_auto_config" {
121121
for_each = length(var.network_tags) > 0 || var.add_cluster_firewall_rules || var.add_master_webhook_firewall_rules || var.add_shadow_firewall_rules || var.insecure_kubelet_readonly_port_enabled != "" ? [1] : []
122122
content {
123-
dynamic "kubelet_config" {
123+
dynamic "node_kubelet_config" {
124124
for_each = var.insecure_kubelet_readonly_port_enabled != "" ? [1] : []
125125
insecure_kubelet_readonly_port_enabled = var.insecure_kubelet_readonly_port_enabled
126126
}

modules/beta-autopilot-public-cluster/cluster.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -120,7 +120,7 @@ resource "google_container_cluster" "primary" {
120120
dynamic "node_pool_auto_config" {
121121
for_each = length(var.network_tags) > 0 || var.add_cluster_firewall_rules || var.add_master_webhook_firewall_rules || var.add_shadow_firewall_rules || var.insecure_kubelet_readonly_port_enabled != "" ? [1] : []
122122
content {
123-
dynamic "kubelet_config" {
123+
dynamic "node_kubelet_config" {
124124
for_each = var.insecure_kubelet_readonly_port_enabled != "" ? [1] : []
125125
insecure_kubelet_readonly_port_enabled = var.insecure_kubelet_readonly_port_enabled
126126
}

0 commit comments

Comments
 (0)