Skip to content

Commit 9b2250a

Browse files
authored
feat: support for ocp v4.15 (#423)
1 parent ac6c77a commit 9b2250a

File tree

15 files changed

+63
-52
lines changed

15 files changed

+63
-52
lines changed

README.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -194,7 +194,7 @@ Optionally, you need the following permissions to attach Access Management tags
194194
| Name | Version |
195195
|------|---------|
196196
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 1.3.0, < 1.7.0 |
197-
| <a name="requirement_ibm"></a> [ibm](#requirement\_ibm) | >= 1.63.0, < 2.0.0 |
197+
| <a name="requirement_ibm"></a> [ibm](#requirement\_ibm) | >= 1.64.0, < 2.0.0 |
198198
| <a name="requirement_kubernetes"></a> [kubernetes](#requirement\_kubernetes) | >= 2.16.1, < 3.0.0 |
199199
| <a name="requirement_null"></a> [null](#requirement\_null) | >= 3.2.1, < 4.0.0 |
200200
@@ -244,6 +244,7 @@ Optionally, you need the following permissions to attach Access Management tags
244244
| <a name="input_cluster_ready_when"></a> [cluster\_ready\_when](#input\_cluster\_ready\_when) | The cluster is ready when one of the following: MasterNodeReady (not recommended), OneWorkerNodeReady, Normal, IngressReady | `string` | `"IngressReady"` | no |
245245
| <a name="input_cos_name"></a> [cos\_name](#input\_cos\_name) | Name of the COS instance to provision for OpenShift internal registry storage. New instance only provisioned if 'enable\_registry\_storage' is true and 'use\_existing\_cos' is false. Default: '<cluster\_name>\_cos' | `string` | `null` | no |
246246
| <a name="input_custom_security_group_ids"></a> [custom\_security\_group\_ids](#input\_custom\_security\_group\_ids) | Security groups to add to all worker nodes. This comes in addition to the IBM maintained security group if attach\_ibm\_managed\_security\_group is set to true. If this variable is set, the default VPC security group is NOT assigned to the worker nodes. | `list(string)` | `null` | no |
247+
| <a name="input_disable_outbound_traffic_protection"></a> [disable\_outbound\_traffic\_protection](#input\_disable\_outbound\_traffic\_protection) | Whether to allow public outbound access from the cluster workers. This is only applicable for `ocp_version` 4.15 | `bool` | `false` | no |
247248
| <a name="input_disable_public_endpoint"></a> [disable\_public\_endpoint](#input\_disable\_public\_endpoint) | Whether access to the public service endpoint is disabled when the cluster is created. Does not affect existing clusters. You can't disable a public endpoint on an existing cluster, so you can't convert a public cluster to a private cluster. To change a public endpoint to private, create another cluster with this input set to `true`. | `bool` | `false` | no |
248249
| <a name="input_enable_registry_storage"></a> [enable\_registry\_storage](#input\_enable\_registry\_storage) | Set to `true` to enable IBM Cloud Object Storage for the Red Hat OpenShift internal image registry. Set to `false` only for new cluster deployments in an account that is allowlisted for this feature. | `bool` | `true` | no |
249250
| <a name="input_existing_cos_id"></a> [existing\_cos\_id](#input\_existing\_cos\_id) | The COS id of an already existing COS instance to use for OpenShift internal registry storage. Only required if 'enable\_registry\_storage' and 'use\_existing\_cos' are true | `string` | `null` | no |

examples/add_rules_to_sg/version.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ terraform {
66
required_providers {
77
ibm = {
88
source = "IBM-Cloud/ibm"
9-
version = "1.63.0"
9+
version = "1.64.0"
1010
}
1111
}
1212
}

examples/advanced/version.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ terraform {
66
required_providers {
77
ibm = {
88
source = "IBM-Cloud/ibm"
9-
version = ">= 1.63.0"
9+
version = ">= 1.64.0"
1010
}
1111
kubernetes = {
1212
source = "hashicorp/kubernetes"

examples/basic/version.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ terraform {
66
required_providers {
77
ibm = {
88
source = "IBM-Cloud/ibm"
9-
version = "1.63.0"
9+
version = "1.64.0"
1010
}
1111
}
1212
}

examples/cross_kms_support/version.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ terraform {
66
required_providers {
77
ibm = {
88
source = "IBM-Cloud/ibm"
9-
version = ">= 1.63.0"
9+
version = ">= 1.64.0"
1010
}
1111
}
1212
}

examples/custom_sg/version.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ terraform {
66
required_providers {
77
ibm = {
88
source = "IBM-Cloud/ibm"
9-
version = ">= 1.63.0"
9+
version = ">= 1.64.0"
1010
}
1111
}
1212
}

examples/fscloud/version.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ terraform {
66
required_providers {
77
ibm = {
88
source = "ibm-cloud/ibm"
9-
version = ">= 1.63.0"
9+
version = ">= 1.64.0"
1010
}
1111
logdna = {
1212
source = "logdna/logdna"

examples/multiple_mzr_clusters/version.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ terraform {
66
required_providers {
77
ibm = {
88
source = "ibm-cloud/ibm"
9-
version = ">= 1.63.0"
9+
version = ">= 1.64.0"
1010
}
1111
kubernetes = {
1212
source = "hashicorp/kubernetes"

main.tf

Lines changed: 38 additions & 36 deletions
Original file line numberDiff line numberDiff line change
@@ -86,24 +86,25 @@ resource "ibm_resource_tag" "cos_access_tag" {
8686
##############################################################################
8787

8888
resource "ibm_container_vpc_cluster" "cluster" {
89-
depends_on = [null_resource.reset_api_key]
90-
count = var.ignore_worker_pool_size_changes ? 0 : 1
91-
name = var.cluster_name
92-
vpc_id = var.vpc_id
93-
tags = var.tags
94-
kube_version = local.ocp_version
95-
flavor = local.default_pool.machine_type
96-
entitlement = var.ocp_entitlement
97-
cos_instance_crn = local.cos_instance_crn
98-
worker_count = local.default_pool.workers_per_zone
99-
resource_group_id = var.resource_group_id
100-
wait_till = var.cluster_ready_when
101-
force_delete_storage = var.force_delete_storage
102-
disable_public_service_endpoint = var.disable_public_endpoint
103-
worker_labels = local.default_pool.labels
104-
crk = local.default_pool.boot_volume_encryption_kms_config == null ? null : local.default_pool.boot_volume_encryption_kms_config.crk
105-
kms_instance_id = local.default_pool.boot_volume_encryption_kms_config == null ? null : local.default_pool.boot_volume_encryption_kms_config.kms_instance_id
106-
kms_account_id = local.default_pool.boot_volume_encryption_kms_config == null ? null : local.default_pool.boot_volume_encryption_kms_config.kms_account_id
89+
depends_on = [null_resource.reset_api_key]
90+
count = var.ignore_worker_pool_size_changes ? 0 : 1
91+
name = var.cluster_name
92+
vpc_id = var.vpc_id
93+
tags = var.tags
94+
kube_version = local.ocp_version
95+
flavor = local.default_pool.machine_type
96+
entitlement = var.ocp_entitlement
97+
cos_instance_crn = local.cos_instance_crn
98+
worker_count = local.default_pool.workers_per_zone
99+
resource_group_id = var.resource_group_id
100+
wait_till = var.cluster_ready_when
101+
force_delete_storage = var.force_delete_storage
102+
disable_public_service_endpoint = var.disable_public_endpoint
103+
worker_labels = local.default_pool.labels
104+
disable_outbound_traffic_protection = var.disable_outbound_traffic_protection
105+
crk = local.default_pool.boot_volume_encryption_kms_config == null ? null : local.default_pool.boot_volume_encryption_kms_config.crk
106+
kms_instance_id = local.default_pool.boot_volume_encryption_kms_config == null ? null : local.default_pool.boot_volume_encryption_kms_config.kms_instance_id
107+
kms_account_id = local.default_pool.boot_volume_encryption_kms_config == null ? null : local.default_pool.boot_volume_encryption_kms_config.kms_account_id
107108

108109
security_groups = local.cluster_security_groups
109110

@@ -151,24 +152,25 @@ resource "ibm_container_vpc_cluster" "cluster" {
151152

152153
# copy of the cluster resource above which ignores changes to the worker pool for use in autoscaling scenarios
153154
resource "ibm_container_vpc_cluster" "autoscaling_cluster" {
154-
depends_on = [null_resource.reset_api_key]
155-
count = var.ignore_worker_pool_size_changes ? 1 : 0
156-
name = var.cluster_name
157-
vpc_id = var.vpc_id
158-
tags = var.tags
159-
kube_version = local.ocp_version
160-
flavor = local.default_pool.machine_type
161-
entitlement = var.ocp_entitlement
162-
cos_instance_crn = local.cos_instance_crn
163-
worker_count = local.default_pool.workers_per_zone
164-
resource_group_id = var.resource_group_id
165-
wait_till = var.cluster_ready_when
166-
force_delete_storage = var.force_delete_storage
167-
disable_public_service_endpoint = var.disable_public_endpoint
168-
worker_labels = local.default_pool.labels
169-
crk = local.default_pool.boot_volume_encryption_kms_config == null ? null : local.default_pool.boot_volume_encryption_kms_config.crk
170-
kms_instance_id = local.default_pool.boot_volume_encryption_kms_config == null ? null : local.default_pool.boot_volume_encryption_kms_config.kms_instance_id
171-
kms_account_id = local.default_pool.boot_volume_encryption_kms_config == null ? null : local.default_pool.boot_volume_encryption_kms_config.kms_account_id
155+
depends_on = [null_resource.reset_api_key]
156+
count = var.ignore_worker_pool_size_changes ? 1 : 0
157+
name = var.cluster_name
158+
vpc_id = var.vpc_id
159+
tags = var.tags
160+
kube_version = local.ocp_version
161+
flavor = local.default_pool.machine_type
162+
entitlement = var.ocp_entitlement
163+
cos_instance_crn = local.cos_instance_crn
164+
worker_count = local.default_pool.workers_per_zone
165+
resource_group_id = var.resource_group_id
166+
wait_till = var.cluster_ready_when
167+
force_delete_storage = var.force_delete_storage
168+
disable_public_service_endpoint = var.disable_public_endpoint
169+
worker_labels = local.default_pool.labels
170+
disable_outbound_traffic_protection = var.disable_outbound_traffic_protection
171+
crk = local.default_pool.boot_volume_encryption_kms_config == null ? null : local.default_pool.boot_volume_encryption_kms_config.crk
172+
kms_instance_id = local.default_pool.boot_volume_encryption_kms_config == null ? null : local.default_pool.boot_volume_encryption_kms_config.kms_instance_id
173+
kms_account_id = local.default_pool.boot_volume_encryption_kms_config == null ? null : local.default_pool.boot_volume_encryption_kms_config.kms_account_id
172174

173175
security_groups = local.cluster_security_groups
174176

modules/fscloud/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ It has been scanned by [IBM Code Risk Analyzer (CRA)](https://cloud.ibm.com/docs
1313
| Name | Version |
1414
|------|---------|
1515
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 1.3.0, < 1.7.0 |
16-
| <a name="requirement_ibm"></a> [ibm](#requirement\_ibm) | >= 1.63.0, < 2.0.0 |
16+
| <a name="requirement_ibm"></a> [ibm](#requirement\_ibm) | >= 1.64.0, < 2.0.0 |
1717
| <a name="requirement_kubernetes"></a> [kubernetes](#requirement\_kubernetes) | >= 2.16.1, < 3.0.0 |
1818
| <a name="requirement_null"></a> [null](#requirement\_null) | >= 3.2.1, < 4.0.0 |
1919
| <a name="requirement_time"></a> [time](#requirement\_time) | >= 0.9.1, < 1.0.0 |

0 commit comments

Comments
 (0)