You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+10-5Lines changed: 10 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,10 +12,14 @@ Sub modules are provided for creating private clusters, beta private clusters, a
12
12
13
13
## Compatibility
14
14
15
-
This module is meant for use with Terraform 0.13+ and tested using Terraform 1.0+.
16
-
If you find incompatibilities using Terraform `>=0.13`, please open an issue.
15
+
This module is meant for use with Terraform 1.3+ and tested using Terraform 1.0+.
16
+
If you find incompatibilities using Terraform `>=1.3`, please open an issue.
17
17
18
-
If you haven't [upgraded][terraform-0.13-upgrade] and need a Terraform
18
+
If you haven't [upgraded to 1.3][terraform-1.3-upgrade] and need a Terraform
19
+
0.13.x-compatible version of this module, the last released version
20
+
intended for Terraform 0.13.x is [27.0.0].
21
+
22
+
If you haven't [upgraded to 0.13][terraform-0.13-upgrade] and need a Terraform
19
23
0.12.x-compatible version of this module, the last released version
20
24
intended for Terraform 0.12.x is [12.3.0].
21
25
@@ -131,7 +135,7 @@ Then perform the following commands on the root folder:
131
135
| add\_master\_webhook\_firewall\_rules | Create master\_webhook firewall rules for ports defined in `firewall_inbound_ports`|`bool`|`false`| no |
132
136
| add\_shadow\_firewall\_rules | Create GKE shadow firewall (the same as default firewall rules with firewall logs enabled). |`bool`|`false`| no |
133
137
| authenticator\_security\_group | The name of the RBAC security group for use with Google security groups in Kubernetes RBAC. Group name must be in format [email protected]|`string`|`null`| no |
| cluster\_dns\_domain | The suffix used for all cluster service records. |`string`|`""`| no |
136
140
| cluster\_dns\_provider | Which in-cluster DNS provider should be used. PROVIDER\_UNSPECIFIED (default) or PLATFORM\_DEFAULT or CLOUD\_DNS. |`string`|`"PROVIDER_UNSPECIFIED"`| no |
137
141
| cluster\_dns\_scope | The scope of access to cluster DNS records. DNS\_SCOPE\_UNSPECIFIED (default) or CLUSTER\_SCOPE or VPC\_SCOPE. |`string`|`"DNS_SCOPE_UNSPECIFIED"`| no |
@@ -317,7 +321,7 @@ The [project factory](https://github.com/terraform-google-modules/terraform-goog
-[Terraform Provider for GCP][terraform-provider-google] v4.51
322
326
#### gcloud
323
327
Some submodules use the [terraform-google-gcloud](https://github.com/terraform-google-modules/terraform-google-gcloud) module. By default, this module assumes you already have gcloud installed in your $PATH.
@@ -346,3 +350,4 @@ In order to operate with the Service Account you must activate the following API
Copy file name to clipboardExpand all lines: modules/acm/README.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -91,7 +91,7 @@ data "google_client_config" "default" {}
91
91
| install\_template\_library | Whether to install the default Policy Controller template library |`bool`|`true`| no |
92
92
| location | GCP location used to reach cluster. |`string`| n/a | yes |
93
93
| metrics\_gcp\_sa\_name | The name of the Google service account for ACM metrics writing |`string`|`"acm-metrics-writer"`| no |
94
-
| policy\_bundles | A list of Policy Controller policy bundles git urls (example: <https://github.com/GoogleCloudPlatform/acm-policy-controller-library.git/bundles/policy-essentials-v2022>) to install on the cluster. |`list(string)`|`[]`| no |
94
+
| policy\_bundles | A list of Policy Controller policy bundles git urls (example: https://github.com/GoogleCloudPlatform/acm-policy-controller-library.git/bundles/policy-essentials-v2022) to install on the cluster. |`list(string)`|`[]`| no |
95
95
| policy\_dir | Subfolder containing configs in ACM Git repo. If un-set, uses Config Management default. |`string`|`""`| no |
96
96
| project\_id | GCP project\_id used to reach cluster. |`string`| n/a | yes |
97
97
| secret\_type | git authentication secret type, is passed through to ConfigManagement spec.git.secretType. Overriden to value 'ssh' if `create_ssh_key` is true |`string`|`"ssh"`| no |
-[Terraform Provider for GCP Beta][terraform-provider-google-beta] v4.51
190
194
#### gcloud
191
195
Some submodules use the [terraform-google-gcloud](https://github.com/terraform-google-modules/terraform-google-gcloud) module. By default, this module assumes you already have gcloud installed in your $PATH.
@@ -214,3 +218,4 @@ In order to operate with the Service Account you must activate the following API
0 commit comments