Skip to content

Commit af2baca

Browse files
committed
updated
1 parent 92b5bb8 commit af2baca

File tree

15 files changed

+28
-16
lines changed

15 files changed

+28
-16
lines changed

modules/fabric-net-svpc-access/README.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,8 @@ Basic usage of this module is as follows:
1919
```hcl
2020
module "net-shared-vpc-access" {
2121
source = "terraform-google-modules/network/google//modules/fabric-net-svpc-access"
22-
version = "~> 1.4.0"
22+
version = "~> 11.0"
23+
2324
host_project_id = "my-host-project-id"
2425
service_project_num = 1
2526
service_project_ids = ["my-service-project-id"]

modules/hierarchical-firewall-policy/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -232,8 +232,8 @@ In a [firewall policy rule](https://cloud.google.com/firewall/docs/firewall-poli
232232
## Requirements
233233
### Installed Software
234234
- [Terraform](https://www.terraform.io/downloads.html) >= 1.3
235-
- [Terraform Provider for GCP](https://github.com/terraform-providers/terraform-provider-google) >= 4.64
236-
- [Terraform Provider for GCP Beta](https://github.com/terraform-providers/terraform-provider-google-beta) >= 4.64
235+
- [Terraform Provider for GCP](https://github.com/terraform-providers/terraform-provider-google) >= 6.18
236+
- [Terraform Provider for GCP Beta](https://github.com/terraform-providers/terraform-provider-google-beta) >= 6.18
237237

238238
### Configure a Service Account
239239
In order to execute this module you must have a Service Account with the following roles:

modules/network-connectivity-center/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ Basic usage of this submodule is as follows:
99
```hcl
1010
module "ncc" {
1111
source = "terraform-google-modules/network/google//modules/network-connectivity-center"
12-
version = "~> 9.0.0"
12+
version = "~> 11.0"
1313
1414
project_id = "<PROJECT ID>"
1515
}

modules/network-firewall-policy/README.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -135,7 +135,7 @@ module "network_firewall_policy" {
135135
| policy\_name | User-provided name of the Network firewall policy | `string` | n/a | yes |
136136
| policy\_region | Location of the firewall policy. Needed for regional firewall policies. Default is null (Global firewall policy) | `string` | `null` | no |
137137
| project\_id | Project ID of the Network firewall policy | `string` | n/a | yes |
138-
| rules | List of Ingress/Egress rules | <pre>list(object({<br> priority = number<br> direction = string<br> action = string<br> rule_name = optional(string)<br> disabled = optional(bool)<br> description = optional(string)<br> enable_logging = optional(bool)<br> target_secure_tags = optional(list(string))<br> target_service_accounts = optional(list(string))<br> match = object({<br> src_ip_ranges = optional(list(string), [])<br> src_fqdns = optional(list(string), [])<br> src_region_codes = optional(list(string), [])<br> src_secure_tags = optional(list(string), [])<br> src_threat_intelligences = optional(list(string), [])<br> src_address_groups = optional(list(string), [])<br> dest_ip_ranges = optional(list(string), [])<br> dest_fqdns = optional(list(string), [])<br> dest_region_codes = optional(list(string), [])<br> dest_threat_intelligences = optional(list(string), [])<br> dest_address_groups = optional(list(string), [])<br> layer4_configs = optional(list(object({<br> ip_protocol = optional(string, "all")<br> ports = optional(list(string), [])<br> })), [{}])<br> })<br> is_mirroring = optional(bool, false)<br> tls_inspect = optional(bool, false)<br> security_profile_group_id = optional(string)<br> }))</pre> | `[]` | no |
138+
| rules | List of Ingress/Egress rules | <pre>list(object({<br> priority = number<br> direction = string<br> action = string<br> rule_name = optional(string)<br> disabled = optional(bool)<br> description = optional(string)<br> enable_logging = optional(bool)<br> target_secure_tags = optional(list(string))<br> target_service_accounts = optional(list(string))<br> match = object({<br> src_ip_ranges = optional(list(string), [])<br> src_fqdns = optional(list(string), [])<br> src_region_codes = optional(list(string), [])<br> src_secure_tags = optional(list(string), [])<br> src_threat_intelligences = optional(list(string), [])<br> src_address_groups = optional(list(string), [])<br> dest_ip_ranges = optional(list(string), [])<br> dest_fqdns = optional(list(string), [])<br> dest_region_codes = optional(list(string), [])<br> dest_threat_intelligences = optional(list(string), [])<br> dest_address_groups = optional(list(string), [])<br> layer4_configs = optional(list(object({<br> ip_protocol = optional(string, "all")<br> ports = optional(list(string), [])<br> })), [{}])<br> })<br> is_mirroring = optional(bool, false)<br> tls_inspect = optional(bool, false)<br> security_profile_group_id = optional(string)<br> src_networks = optional(list(string), [])<br> src_network_scope = optional(string)<br> dest_network_scope = optional(string)<br> }))</pre> | `[]` | no |
139139
| target\_vpcs | List of target VPC IDs that the firewall policy will be attached to | `list(string)` | `[]` | no |
140140

141141
## Outputs
@@ -203,8 +203,8 @@ In a [firewall policy rule](https://cloud.google.com/firewall/docs/firewall-poli
203203
## Requirements
204204
### Installed Software
205205
- [Terraform](https://www.terraform.io/downloads.html) >= 1.3
206-
- [Terraform Provider for GCP](https://github.com/terraform-providers/terraform-provider-google) >= 4.64
207-
- [Terraform Provider for GCP Beta](https://github.com/terraform-providers/terraform-provider-google-beta) >= 4.64
206+
- [Terraform Provider for GCP](https://github.com/terraform-providers/terraform-provider-google) >= 6.28
207+
- [Terraform Provider for GCP Beta](https://github.com/terraform-providers/terraform-provider-google-beta) >= 6.28
208208

209209
### Configure a Service Account
210210
In order to execute this module you must have a Service Account with the following roles:

modules/network-firewall-policy/main.tf

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -70,6 +70,9 @@ resource "google_compute_network_firewall_policy_rule" "rules" {
7070
dest_region_codes = each.value.direction == "EGRESS" ? lookup(each.value.match, "dest_region_codes", []) : []
7171
dest_threat_intelligences = each.value.direction == "EGRESS" ? lookup(each.value.match, "dest_threat_intelligences", []) : []
7272
dest_address_groups = each.value.direction == "EGRESS" ? lookup(each.value.match, "dest_address_groups", []) : []
73+
src_networks = lookup(each.value.match, "src_networks", [])
74+
src_network_scope = lookup(each.value.match, "src_network_scope", null)
75+
dest_network_scope = lookup(each.value.match, "dest_network_scope", null)
7376

7477
dynamic "src_secure_tags" {
7578
for_each = each.value.direction != "INGRESS" || each.value.match.src_secure_tags == null ? [] : toset(each.value.match.src_secure_tags)
@@ -184,6 +187,9 @@ resource "google_compute_region_network_firewall_policy_rule" "rules" {
184187
dest_region_codes = each.value.direction == "EGRESS" ? lookup(each.value.match, "dest_region_codes", []) : []
185188
dest_threat_intelligences = each.value.direction == "EGRESS" ? lookup(each.value.match, "dest_threat_intelligences", []) : []
186189
dest_address_groups = each.value.direction == "EGRESS" ? lookup(each.value.match, "dest_address_groups", []) : []
190+
src_networks = lookup(each.value.match, "src_networks", [])
191+
src_network_scope = lookup(each.value.match, "src_network_scope", null)
192+
dest_network_scope = lookup(each.value.match, "dest_network_scope", null)
187193

188194
dynamic "src_secure_tags" {
189195
for_each = each.value.direction != "INGRESS" || each.value.match.src_secure_tags == null ? [] : toset(each.value.match.src_secure_tags)

modules/network-firewall-policy/variables.tf

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -78,6 +78,9 @@ variable "rules" {
7878
is_mirroring = optional(bool, false)
7979
tls_inspect = optional(bool, false)
8080
security_profile_group_id = optional(string)
81+
src_networks = optional(list(string), [])
82+
src_network_scope = optional(string)
83+
dest_network_scope = optional(string)
8184
}))
8285
default = []
8386
validation {

modules/network-peering/README.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,8 @@ Basic usage of this module is as follows:
1313

1414
```hcl
1515
module "peering" {
16-
source = "terraform-google-modules/network/google//modules/network-peering"
16+
source = "terraform-google-modules/network/google//modules/network-peering"
17+
version = "~> 11.0"
1718
1819
prefix = "name-prefix"
1920
local_network = "<FIRST NETWORK SELF LINK>"

modules/private-service-connect/README.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,8 @@ Basic usage of this module is as follows:
1616

1717
```hcl
1818
module "private_service_connect" {
19-
source = "terraform-google-modules/network/google//modules/private-service-connect"
19+
source = "terraform-google-modules/network/google//modules/private-service-connect"
20+
version = "~> 11.0"
2021
2122
project_id = "<PROJECT_ID>"
2223
network_self_link = "<NETWORK_SELF_LINK>"

modules/routes-beta/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ Basic usage of this submodule is as follows:
1818
```hcl
1919
module "vpc" {
2020
source = "terraform-google-modules/network/google//modules/routes-beta"
21-
version = "~> 2.0.0"
21+
version = "~> 11.0"
2222
2323
project_id = "<PROJECT ID>"
2424
network_name = "example-vpc"

modules/routes/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ Basic usage of this submodule is as follows:
1414
```hcl
1515
module "vpc" {
1616
source = "terraform-google-modules/network/google//modules/routes"
17-
version = "~> 2.0.0"
17+
version = "~> 11.0"
1818
1919
project_id = "<PROJECT ID>"
2020
network_name = "example-vpc"

0 commit comments

Comments
 (0)