diff --git a/blueprints/gke/patterns/autopilot-cluster/versions.tf b/blueprints/gke/patterns/autopilot-cluster/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/blueprints/gke/patterns/autopilot-cluster/versions.tf
+++ b/blueprints/gke/patterns/autopilot-cluster/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/blueprints/gke/patterns/batch/versions.tf b/blueprints/gke/patterns/batch/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/blueprints/gke/patterns/batch/versions.tf
+++ b/blueprints/gke/patterns/batch/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/blueprints/gke/patterns/kafka/versions.tf b/blueprints/gke/patterns/kafka/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/blueprints/gke/patterns/kafka/versions.tf
+++ b/blueprints/gke/patterns/kafka/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/blueprints/gke/patterns/mysql/versions.tf b/blueprints/gke/patterns/mysql/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/blueprints/gke/patterns/mysql/versions.tf
+++ b/blueprints/gke/patterns/mysql/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/blueprints/gke/patterns/redis-cluster/versions.tf b/blueprints/gke/patterns/redis-cluster/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/blueprints/gke/patterns/redis-cluster/versions.tf
+++ b/blueprints/gke/patterns/redis-cluster/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/default-versions.tf b/default-versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/default-versions.tf
+++ b/default-versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/__experimental_deprecated/alloydb-instance/versions.tf b/modules/__experimental_deprecated/alloydb-instance/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/__experimental_deprecated/alloydb-instance/versions.tf
+++ b/modules/__experimental_deprecated/alloydb-instance/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/__experimental_deprecated/net-neg/versions.tf b/modules/__experimental_deprecated/net-neg/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/__experimental_deprecated/net-neg/versions.tf
+++ b/modules/__experimental_deprecated/net-neg/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/__experimental_deprecated/project-iam-magic/versions.tf b/modules/__experimental_deprecated/project-iam-magic/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/__experimental_deprecated/project-iam-magic/versions.tf
+++ b/modules/__experimental_deprecated/project-iam-magic/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/analytics-hub/versions.tf b/modules/analytics-hub/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/analytics-hub/versions.tf
+++ b/modules/analytics-hub/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/api-gateway/versions.tf b/modules/api-gateway/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/api-gateway/versions.tf
+++ b/modules/api-gateway/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/apigee/versions.tf b/modules/apigee/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/apigee/versions.tf
+++ b/modules/apigee/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/artifact-registry/versions.tf b/modules/artifact-registry/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/artifact-registry/versions.tf
+++ b/modules/artifact-registry/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/bigquery-dataset/versions.tf b/modules/bigquery-dataset/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/bigquery-dataset/versions.tf
+++ b/modules/bigquery-dataset/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/bigtable-instance/versions.tf b/modules/bigtable-instance/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/bigtable-instance/versions.tf
+++ b/modules/bigtable-instance/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/billing-account/versions.tf b/modules/billing-account/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/billing-account/versions.tf
+++ b/modules/billing-account/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/binauthz/versions.tf b/modules/binauthz/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/binauthz/versions.tf
+++ b/modules/binauthz/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/cloud-config-container/__need_fixing/onprem/versions.tf b/modules/cloud-config-container/__need_fixing/onprem/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/cloud-config-container/__need_fixing/onprem/versions.tf
+++ b/modules/cloud-config-container/__need_fixing/onprem/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/cloud-config-container/__need_fixing/squid/versions.tf b/modules/cloud-config-container/__need_fixing/squid/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/cloud-config-container/__need_fixing/squid/versions.tf
+++ b/modules/cloud-config-container/__need_fixing/squid/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/cloud-config-container/bindplane/versions.tf b/modules/cloud-config-container/bindplane/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/cloud-config-container/bindplane/versions.tf
+++ b/modules/cloud-config-container/bindplane/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/cloud-config-container/coredns/versions.tf b/modules/cloud-config-container/coredns/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/cloud-config-container/coredns/versions.tf
+++ b/modules/cloud-config-container/coredns/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/cloud-config-container/cos-generic-metadata/versions.tf b/modules/cloud-config-container/cos-generic-metadata/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/cloud-config-container/cos-generic-metadata/versions.tf
+++ b/modules/cloud-config-container/cos-generic-metadata/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/cloud-config-container/envoy-sni-dyn-fwd-proxy/versions.tf b/modules/cloud-config-container/envoy-sni-dyn-fwd-proxy/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/cloud-config-container/envoy-sni-dyn-fwd-proxy/versions.tf
+++ b/modules/cloud-config-container/envoy-sni-dyn-fwd-proxy/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/cloud-config-container/envoy-traffic-director/versions.tf b/modules/cloud-config-container/envoy-traffic-director/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/cloud-config-container/envoy-traffic-director/versions.tf
+++ b/modules/cloud-config-container/envoy-traffic-director/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/cloud-config-container/mysql/versions.tf b/modules/cloud-config-container/mysql/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/cloud-config-container/mysql/versions.tf
+++ b/modules/cloud-config-container/mysql/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/cloud-config-container/nginx-tls/versions.tf b/modules/cloud-config-container/nginx-tls/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/cloud-config-container/nginx-tls/versions.tf
+++ b/modules/cloud-config-container/nginx-tls/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/cloud-config-container/nginx/versions.tf b/modules/cloud-config-container/nginx/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/cloud-config-container/nginx/versions.tf
+++ b/modules/cloud-config-container/nginx/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/cloud-config-container/simple-nva/versions.tf b/modules/cloud-config-container/simple-nva/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/cloud-config-container/simple-nva/versions.tf
+++ b/modules/cloud-config-container/simple-nva/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/cloud-function-v1/versions.tf b/modules/cloud-function-v1/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/cloud-function-v1/versions.tf
+++ b/modules/cloud-function-v1/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/cloud-function-v2/versions.tf b/modules/cloud-function-v2/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/cloud-function-v2/versions.tf
+++ b/modules/cloud-function-v2/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/cloud-identity-group/versions.tf b/modules/cloud-identity-group/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/cloud-identity-group/versions.tf
+++ b/modules/cloud-identity-group/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/cloud-run-v2/versions.tf b/modules/cloud-run-v2/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/cloud-run-v2/versions.tf
+++ b/modules/cloud-run-v2/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/cloud-run/versions.tf b/modules/cloud-run/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/cloud-run/versions.tf
+++ b/modules/cloud-run/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/cloudsql-instance/versions.tf b/modules/cloudsql-instance/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/cloudsql-instance/versions.tf
+++ b/modules/cloudsql-instance/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/compute-mig/versions.tf b/modules/compute-mig/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/compute-mig/versions.tf
+++ b/modules/compute-mig/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/compute-vm/versions.tf b/modules/compute-vm/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/compute-vm/versions.tf
+++ b/modules/compute-vm/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/container-registry/versions.tf b/modules/container-registry/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/container-registry/versions.tf
+++ b/modules/container-registry/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/data-catalog-policy-tag/versions.tf b/modules/data-catalog-policy-tag/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/data-catalog-policy-tag/versions.tf
+++ b/modules/data-catalog-policy-tag/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/data-catalog-tag-template/versions.tf b/modules/data-catalog-tag-template/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/data-catalog-tag-template/versions.tf
+++ b/modules/data-catalog-tag-template/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/data-catalog-tag/versions.tf b/modules/data-catalog-tag/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/data-catalog-tag/versions.tf
+++ b/modules/data-catalog-tag/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/dataform-repository/versions.tf b/modules/dataform-repository/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/dataform-repository/versions.tf
+++ b/modules/dataform-repository/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/datafusion/versions.tf b/modules/datafusion/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/datafusion/versions.tf
+++ b/modules/datafusion/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/dataplex-datascan/versions.tf b/modules/dataplex-datascan/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/dataplex-datascan/versions.tf
+++ b/modules/dataplex-datascan/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/dataplex/versions.tf b/modules/dataplex/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/dataplex/versions.tf
+++ b/modules/dataplex/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/dataproc/versions.tf b/modules/dataproc/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/dataproc/versions.tf
+++ b/modules/dataproc/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/dns-response-policy/versions.tf b/modules/dns-response-policy/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/dns-response-policy/versions.tf
+++ b/modules/dns-response-policy/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/dns/versions.tf b/modules/dns/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/dns/versions.tf
+++ b/modules/dns/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/endpoints/versions.tf b/modules/endpoints/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/endpoints/versions.tf
+++ b/modules/endpoints/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/folder/versions.tf b/modules/folder/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/folder/versions.tf
+++ b/modules/folder/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/gcs/versions.tf b/modules/gcs/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/gcs/versions.tf
+++ b/modules/gcs/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/gcve-private-cloud/versions.tf b/modules/gcve-private-cloud/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/gcve-private-cloud/versions.tf
+++ b/modules/gcve-private-cloud/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/gke-cluster-autopilot/versions.tf b/modules/gke-cluster-autopilot/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/gke-cluster-autopilot/versions.tf
+++ b/modules/gke-cluster-autopilot/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/gke-cluster-standard/versions.tf b/modules/gke-cluster-standard/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/gke-cluster-standard/versions.tf
+++ b/modules/gke-cluster-standard/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/gke-hub/versions.tf b/modules/gke-hub/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/gke-hub/versions.tf
+++ b/modules/gke-hub/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/gke-nodepool/versions.tf b/modules/gke-nodepool/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/gke-nodepool/versions.tf
+++ b/modules/gke-nodepool/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/iam-service-account/versions.tf b/modules/iam-service-account/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/iam-service-account/versions.tf
+++ b/modules/iam-service-account/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/kms/versions.tf b/modules/kms/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/kms/versions.tf
+++ b/modules/kms/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/logging-bucket/versions.tf b/modules/logging-bucket/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/logging-bucket/versions.tf
+++ b/modules/logging-bucket/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/ncc-spoke-ra/versions.tf b/modules/ncc-spoke-ra/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/ncc-spoke-ra/versions.tf
+++ b/modules/ncc-spoke-ra/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/net-address/versions.tf b/modules/net-address/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/net-address/versions.tf
+++ b/modules/net-address/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/net-cloudnat/versions.tf b/modules/net-cloudnat/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/net-cloudnat/versions.tf
+++ b/modules/net-cloudnat/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/net-firewall-policy/versions.tf b/modules/net-firewall-policy/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/net-firewall-policy/versions.tf
+++ b/modules/net-firewall-policy/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/net-ipsec-over-interconnect/versions.tf b/modules/net-ipsec-over-interconnect/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/net-ipsec-over-interconnect/versions.tf
+++ b/modules/net-ipsec-over-interconnect/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/net-lb-app-ext-regional/versions.tf b/modules/net-lb-app-ext-regional/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/net-lb-app-ext-regional/versions.tf
+++ b/modules/net-lb-app-ext-regional/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/net-lb-app-ext/versions.tf b/modules/net-lb-app-ext/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/net-lb-app-ext/versions.tf
+++ b/modules/net-lb-app-ext/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/net-lb-app-int-cross-region/versions.tf b/modules/net-lb-app-int-cross-region/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/net-lb-app-int-cross-region/versions.tf
+++ b/modules/net-lb-app-int-cross-region/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/net-lb-app-int/versions.tf b/modules/net-lb-app-int/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/net-lb-app-int/versions.tf
+++ b/modules/net-lb-app-int/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/net-lb-ext/versions.tf b/modules/net-lb-ext/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/net-lb-ext/versions.tf
+++ b/modules/net-lb-ext/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/net-lb-int/versions.tf b/modules/net-lb-int/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/net-lb-int/versions.tf
+++ b/modules/net-lb-int/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/net-lb-proxy-int/versions.tf b/modules/net-lb-proxy-int/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/net-lb-proxy-int/versions.tf
+++ b/modules/net-lb-proxy-int/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/net-swp/versions.tf b/modules/net-swp/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/net-swp/versions.tf
+++ b/modules/net-swp/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/net-vlan-attachment/versions.tf b/modules/net-vlan-attachment/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/net-vlan-attachment/versions.tf
+++ b/modules/net-vlan-attachment/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/net-vpc-firewall/versions.tf b/modules/net-vpc-firewall/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/net-vpc-firewall/versions.tf
+++ b/modules/net-vpc-firewall/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/net-vpc-peering/versions.tf b/modules/net-vpc-peering/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/net-vpc-peering/versions.tf
+++ b/modules/net-vpc-peering/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/net-vpc/README.md b/modules/net-vpc/README.md
index fb115804c2..543482ec9a 100644
--- a/modules/net-vpc/README.md
+++ b/modules/net-vpc/README.md
@@ -663,11 +663,11 @@ module "vpc" {
| [routing_mode](variables.tf#L228) | The network routing mode (default 'GLOBAL'). | string
| | "GLOBAL"
|
| [shared_vpc_host](variables.tf#L238) | Enable shared VPC for this project. | bool
| | false
|
| [shared_vpc_service_projects](variables.tf#L244) | Shared VPC service projects to register with this host. | list(string)
| | []
|
-| [subnets](variables.tf#L250) | Subnet configuration. | list(object({…}))
| | []
|
-| [subnets_private_nat](variables.tf#L297) | List of private NAT subnets. | list(object({…}))
| | []
|
-| [subnets_proxy_only](variables.tf#L309) | List of proxy-only subnets for Regional HTTPS or Internal HTTPS load balancers. Note: Only one proxy-only subnet for each VPC network in each region can be active. | list(object({…}))
| | []
|
-| [subnets_psc](variables.tf#L343) | List of subnets for Private Service Connect service producers. | list(object({…}))
| | []
|
-| [vpc_create](variables.tf#L375) | Create VPC. When set to false, uses a data source to reference existing VPC. | bool
| | true
|
+| [subnets](variables.tf#L250) | Subnet configuration. | list(object({…}))
| | []
|
+| [subnets_private_nat](variables.tf#L296) | List of private NAT subnets. | list(object({…}))
| | []
|
+| [subnets_proxy_only](variables.tf#L308) | List of proxy-only subnets for Regional HTTPS or Internal HTTPS load balancers. Note: Only one proxy-only subnet for each VPC network in each region can be active. | list(object({…}))
| | []
|
+| [subnets_psc](variables.tf#L342) | List of subnets for Private Service Connect service producers. | list(object({…}))
| | []
|
+| [vpc_create](variables.tf#L374) | Create VPC. When set to false, uses a data source to reference existing VPC. | bool
| | true
|
## Outputs
diff --git a/modules/net-vpc/subnets.tf b/modules/net-vpc/subnets.tf
index 09d4748d00..d0af04b2e9 100644
--- a/modules/net-vpc/subnets.tf
+++ b/modules/net-vpc/subnets.tf
@@ -147,10 +147,6 @@ resource "google_compute_subnetwork" "subnetwork" {
: each.value.description
)
private_ip_google_access = each.value.enable_private_access
- secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [
- for name, range in each.value.secondary_ip_ranges :
- { range_name = name, ip_cidr_range = range }
- ]
stack_type = (
try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null
)
@@ -158,6 +154,22 @@ resource "google_compute_subnetwork" "subnetwork" {
try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null
)
# private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null)
+ dynamic "secondary_ip_range" {
+ for_each = each.value.secondary_ip_ranges == null ? {} : each.value.secondary_ip_ranges
+ content {
+ range_name = secondary_ip_range.key
+ ip_cidr_range = (
+ startswith(secondary_ip_range.value, "networkconnectivity.googleapis.com")
+ ? null
+ : secondary_ip_range.value
+ )
+ reserved_internal_range = (
+ startswith(secondary_ip_range.value, "networkconnectivity.googleapis.com")
+ ? secondary_ip_range.value
+ : null
+ )
+ }
+ }
dynamic "log_config" {
for_each = each.value.flow_logs_config != null ? [""] : []
content {
diff --git a/modules/net-vpc/variables.tf b/modules/net-vpc/variables.tf
index 6fd011bec8..4bee5de510 100644
--- a/modules/net-vpc/variables.tf
+++ b/modules/net-vpc/variables.tf
@@ -269,8 +269,7 @@ variable "subnets" {
# enable_private_access = optional(string)
}))
secondary_ip_ranges = optional(map(string))
-
- iam = optional(map(list(string)), {})
+ iam = optional(map(list(string)), {})
iam_bindings = optional(map(object({
role = string
members = list(string)
diff --git a/modules/net-vpc/versions.tf b/modules/net-vpc/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/net-vpc/versions.tf
+++ b/modules/net-vpc/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/net-vpn-dynamic/versions.tf b/modules/net-vpn-dynamic/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/net-vpn-dynamic/versions.tf
+++ b/modules/net-vpn-dynamic/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/net-vpn-ha/versions.tf b/modules/net-vpn-ha/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/net-vpn-ha/versions.tf
+++ b/modules/net-vpn-ha/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/net-vpn-static/versions.tf b/modules/net-vpn-static/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/net-vpn-static/versions.tf
+++ b/modules/net-vpn-static/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/organization/versions.tf b/modules/organization/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/organization/versions.tf
+++ b/modules/organization/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/project/versions.tf b/modules/project/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/project/versions.tf
+++ b/modules/project/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/projects-data-source/versions.tf b/modules/projects-data-source/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/projects-data-source/versions.tf
+++ b/modules/projects-data-source/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/pubsub/versions.tf b/modules/pubsub/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/pubsub/versions.tf
+++ b/modules/pubsub/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/secret-manager/versions.tf b/modules/secret-manager/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/secret-manager/versions.tf
+++ b/modules/secret-manager/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/service-directory/versions.tf b/modules/service-directory/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/service-directory/versions.tf
+++ b/modules/service-directory/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/source-repository/versions.tf b/modules/source-repository/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/source-repository/versions.tf
+++ b/modules/source-repository/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/vpc-sc/versions.tf b/modules/vpc-sc/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/vpc-sc/versions.tf
+++ b/modules/vpc-sc/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/modules/workstation-cluster/versions.tf b/modules/workstation-cluster/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/modules/workstation-cluster/versions.tf
+++ b/modules/workstation-cluster/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/tests/examples_e2e/setup_module/versions.tf b/tests/examples_e2e/setup_module/versions.tf
index bc9986b3c7..05e52b2db2 100644
--- a/tests/examples_e2e/setup_module/versions.tf
+++ b/tests/examples_e2e/setup_module/versions.tf
@@ -17,11 +17,11 @@ terraform {
required_providers {
google = {
source = "hashicorp/google"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
google-beta = {
source = "hashicorp/google-beta"
- version = ">= 5.26.0, < 6.0.0" # tftest
+ version = ">= 5.29.0, < 6.0.0" # tftest
}
}
}
diff --git a/tests/fast/stages/s2_networking_e_nva_bgp/simple.yaml b/tests/fast/stages/s2_networking_e_nva_bgp/simple.yaml
index 25ba7ccf9b..e0316d393e 100644
--- a/tests/fast/stages/s2_networking_e_nva_bgp/simple.yaml
+++ b/tests/fast/stages/s2_networking_e_nva_bgp/simple.yaml
@@ -112,21 +112,22 @@ values:
alert_strategy: []
combiner: OR
conditions:
- - condition_absent: []
- condition_matched_log: []
- condition_monitoring_query_language:
- - duration: 120s
- evaluation_missing_data: null
- query: fetch vpn_gateway| { metric vpn.googleapis.com/network/sent_bytes_count;
- metric vpn.googleapis.com/network/received_bytes_count }| align rate (1m)|
- group_by [metric.tunnel_name]| outer_join 0,0| value val(0) + val(1)| condition
- val() > 187.5 "MBy/s"
- trigger:
- - count: 1
- percent: null
- condition_prometheus_query_language: []
- condition_threshold: []
- display_name: VPN Tunnel Bandwidth usage
+ - condition_absent: []
+ condition_matched_log: []
+ condition_monitoring_query_language:
+ - duration: 120s
+ evaluation_missing_data: null
+ query:
+ fetch vpn_gateway| { metric vpn.googleapis.com/network/sent_bytes_count;
+ metric vpn.googleapis.com/network/received_bytes_count }| align rate (1m)|
+ group_by [metric.tunnel_name]| outer_join 0,0| value val(0) + val(1)| condition
+ val() > 187.5 "MBy/s"
+ trigger:
+ - count: 1
+ percent: null
+ condition_prometheus_query_language: []
+ condition_threshold: []
+ display_name: VPN Tunnel Bandwidth usage
display_name: VPN Tunnel Bandwidth usage
documentation: []
enabled: true
@@ -139,20 +140,21 @@ values:
alert_strategy: []
combiner: OR
conditions:
- - condition_absent: []
- condition_matched_log: []
- condition_monitoring_query_language:
- - duration: 120s
- evaluation_missing_data: null
- query: 'fetch vpn_gateway| metric vpn.googleapis.com/tunnel_established| group_by
- 5m, [value_tunnel_established_max: max(value.tunnel_established)]| every
- 5m| condition val() < 1 ''1'''
- trigger:
- - count: 1
- percent: null
- condition_prometheus_query_language: []
- condition_threshold: []
- display_name: VPN Tunnel Established
+ - condition_absent: []
+ condition_matched_log: []
+ condition_monitoring_query_language:
+ - duration: 120s
+ evaluation_missing_data: null
+ query:
+ "fetch vpn_gateway| metric vpn.googleapis.com/tunnel_established| group_by
+ 5m, [value_tunnel_established_max: max(value.tunnel_established)]| every
+ 5m| condition val() < 1 '1'"
+ trigger:
+ - count: 1
+ percent: null
+ condition_prometheus_query_language: []
+ condition_threshold: []
+ display_name: VPN Tunnel Established
display_name: VPN Tunnel Established
documentation: []
enabled: true
@@ -162,15 +164,17 @@ values:
timeouts: null
user_labels: null
google_monitoring_dashboard.dashboard["firewall_insights.json"]:
- dashboard_json: '{"displayName":"Firewall Insights Monitoring","gridLayout":{"columns":"2","widgets":[{"title":"Subnet
+ dashboard_json:
+ '{"displayName":"Firewall Insights Monitoring","gridLayout":{"columns":"2","widgets":[{"title":"Subnet
Firewall Hit Counts","xyChart":{"chartOptions":{"mode":"COLOR"},"dataSets":[{"minAlignmentPeriod":"60s","plotType":"LINE","targetAxis":"Y1","timeSeriesQuery":{"timeSeriesFilter":{"aggregation":{"perSeriesAligner":"ALIGN_RATE"},"filter":"metric.type=\"firewallinsights.googleapis.com/subnet/firewall_hit_count\"
resource.type=\"gce_subnetwork\"","secondaryAggregation":{}},"unitOverride":"1"}}],"timeshiftDuration":"0s","yAxis":{"label":"y1Axis","scale":"LINEAR"}}},{"title":"VM
Firewall Hit Counts","xyChart":{"chartOptions":{"mode":"COLOR"},"dataSets":[{"minAlignmentPeriod":"60s","plotType":"LINE","targetAxis":"Y1","timeSeriesQuery":{"timeSeriesFilter":{"aggregation":{"perSeriesAligner":"ALIGN_RATE"},"filter":"metric.type=\"firewallinsights.googleapis.com/vm/firewall_hit_count\"
resource.type=\"gce_instance\"","secondaryAggregation":{}},"unitOverride":"1"}}],"timeshiftDuration":"0s","yAxis":{"label":"y1Axis","scale":"LINEAR"}}}]}}'
project: fast2-prod-net-landing-0
timeouts: null
- google_monitoring_dashboard.dashboard["vpc_and_vpc_peering_group_quotas.json"]:
- dashboard_json: '{"dashboardFilters":[],"displayName":"VPC \u0026 VPC Peering
+ ? google_monitoring_dashboard.dashboard["vpc_and_vpc_peering_group_quotas.json"]
+ : dashboard_json:
+ '{"dashboardFilters":[],"displayName":"VPC \u0026 VPC Peering
Group Quotas","labels":{},"mosaicLayout":{"columns":12,"tiles":[{"height":4,"widget":{"title":"Internal
network (L4) Load Balancers per VPC Peering Group","xyChart":{"chartOptions":{"mode":"COLOR"},"dataSets":[{"breakdowns":[],"dimensions":[],"measures":[],"plotType":"LINE","targetAxis":"Y1","timeSeriesQuery":{"timeSeriesQueryLanguage":"fetch
compute.googleapis.com/VpcNetwork\n|{ metric\n compute.googleapis.com/quota/internal_lb_forwarding_rules_per_peering_group/usage\n |
@@ -223,7 +227,8 @@ values:
project: fast2-prod-net-landing-0
timeouts: null
google_monitoring_dashboard.dashboard["vpn.json"]:
- dashboard_json: '{"displayName":"VPN Monitoring","mosaicLayout":{"columns":12,"tiles":[{"height":4,"widget":{"title":"Number
+ dashboard_json:
+ '{"displayName":"VPN Monitoring","mosaicLayout":{"columns":12,"tiles":[{"height":4,"widget":{"title":"Number
of connections","xyChart":{"chartOptions":{"mode":"COLOR"},"dataSets":[{"minAlignmentPeriod":"60s","plotType":"LINE","targetAxis":"Y1","timeSeriesQuery":{"timeSeriesFilter":{"aggregation":{"perSeriesAligner":"ALIGN_MEAN"},"filter":"metric.type=\"vpn.googleapis.com/gateway/connections\"
resource.type=\"vpn_gateway\"","secondaryAggregation":{}},"unitOverride":"1"}}],"timeshiftDuration":"0s","yAxis":{"label":"y1Axis","scale":"LINEAR"}}},"width":4},{"height":4,"widget":{"title":"Tunnel
established","xyChart":{"chartOptions":{"mode":"COLOR"},"dataSets":[{"minAlignmentPeriod":"60s","plotType":"LINE","targetAxis":"Y1","timeSeriesQuery":{"timeSeriesFilter":{"aggregation":{"perSeriesAligner":"ALIGN_MEAN"},"filter":"metric.type=\"vpn.googleapis.com/tunnel_established\"
@@ -273,9 +278,9 @@ values:
source: null
temporary_hold: null
timeouts: null
- module.dev-dns-peer-landing-rev-10.google_dns_managed_zone.dns_managed_zone[0]:
- cloud_logging_config:
- - enable_logging: false
+ ? module.dev-dns-peer-landing-rev-10.google_dns_managed_zone.dns_managed_zone[0]
+ : cloud_logging_config:
+ - enable_logging: false
description: Terraform managed.
dns_name: 10.in-addr.arpa.
dnssec_config: []
@@ -290,7 +295,7 @@ values:
visibility: private
module.dev-dns-peer-landing-root.google_dns_managed_zone.dns_managed_zone[0]:
cloud_logging_config:
- - enable_logging: false
+ - enable_logging: false
description: Terraform managed.
dns_name: .
dnssec_config: []
@@ -305,7 +310,7 @@ values:
visibility: private
module.dev-dns-private-zone.google_dns_managed_zone.dns_managed_zone[0]:
cloud_logging_config:
- - enable_logging: false
+ - enable_logging: false
description: Terraform managed.
dns_name: dev.gcp.example.com.
dnssec_config: []
@@ -318,23 +323,23 @@ values:
service_directory_config: []
timeouts: null
visibility: private
- module.dev-dns-private-zone.google_dns_record_set.dns_record_set["A localhost"]:
- managed_zone: dev-gcp-example-com
+ ? module.dev-dns-private-zone.google_dns_record_set.dns_record_set["A localhost"]
+ : managed_zone: dev-gcp-example-com
name: localhost.dev.gcp.example.com.
project: fast2-dev-net-spoke-0
routing_policy: []
rrdatas:
- - 127.0.0.1
+ - 127.0.0.1
ttl: 300
type: A
- module.dev-spoke-firewall.google_compute_firewall.custom-rules["ingress-allow-composer-nodes"]:
- allow:
- - ports:
- - '80'
- - '443'
- - '3306'
- - '3307'
- protocol: tcp
+ ? module.dev-spoke-firewall.google_compute_firewall.custom-rules["ingress-allow-composer-nodes"]
+ : allow:
+ - ports:
+ - "80"
+ - "443"
+ - "3306"
+ - "3307"
+ protocol: tcp
deny: []
description: Allow traffic to Composer nodes.
direction: INGRESS
@@ -347,17 +352,17 @@ values:
source_ranges: null
source_service_accounts: null
source_tags:
- - composer-worker
+ - composer-worker
target_service_accounts: null
target_tags:
- - composer-worker
- timeouts: null
- module.dev-spoke-firewall.google_compute_firewall.custom-rules["ingress-allow-dataflow-load"]:
- allow:
- - ports:
- - '12345'
- - '12346'
- protocol: tcp
+ - composer-worker
+ timeouts: null
+ ? module.dev-spoke-firewall.google_compute_firewall.custom-rules["ingress-allow-dataflow-load"]
+ : allow:
+ - ports:
+ - "12345"
+ - "12346"
+ protocol: tcp
deny: []
description: Allow traffic to Dataflow nodes.
direction: INGRESS
@@ -370,37 +375,37 @@ values:
source_ranges: null
source_service_accounts: null
source_tags:
- - dataflow
+ - dataflow
target_service_accounts: null
target_tags:
- - dataflow
+ - dataflow
timeouts: null
- module.dev-spoke-firewall.google_compute_firewall.custom-rules["ingress-default-deny"]:
- allow: []
+ ? module.dev-spoke-firewall.google_compute_firewall.custom-rules["ingress-default-deny"]
+ : allow: []
deny:
- - ports: []
- protocol: all
+ - ports: []
+ protocol: all
description: Deny and log any unmatched ingress traffic.
direction: INGRESS
disabled: false
log_config:
- - metadata: EXCLUDE_ALL_METADATA
+ - metadata: EXCLUDE_ALL_METADATA
name: ingress-default-deny
network: dev-spoke-0
priority: 65535
project: fast2-dev-net-spoke-0
source_ranges:
- - 0.0.0.0/0
+ - 0.0.0.0/0
source_service_accounts: null
source_tags: null
target_service_accounts: null
target_tags: null
timeouts: null
- module.dev-spoke-project.google_compute_shared_vpc_host_project.shared_vpc_host[0]:
- project: fast2-dev-net-spoke-0
+ ? module.dev-spoke-project.google_compute_shared_vpc_host_project.shared_vpc_host[0]
+ : project: fast2-dev-net-spoke-0
timeouts: null
- module.dev-spoke-project.google_monitoring_monitored_project.primary["fast2-prod-net-landing-0"]:
- metrics_scope: fast2-prod-net-landing-0
+ ? module.dev-spoke-project.google_monitoring_monitored_project.primary["fast2-prod-net-landing-0"]
+ : metrics_scope: fast2-prod-net-landing-0
name: fast2-dev-net-spoke-0
timeouts: null
module.dev-spoke-project.google_project.project[0]:
@@ -413,69 +418,69 @@ values:
project_id: fast2-dev-net-spoke-0
skip_delete: false
timeouts: null
- module.dev-spoke-project.google_project_iam_binding.authoritative["roles/dns.admin"]:
- condition: []
+ ? module.dev-spoke-project.google_project_iam_binding.authoritative["roles/dns.admin"]
+ : condition: []
members:
- - serviceAccount:string
+ - serviceAccount:string
project: fast2-dev-net-spoke-0
role: roles/dns.admin
- module.dev-spoke-project.google_project_iam_binding.bindings["sa_delegated_grants"]:
- condition:
- - description: Development host project delegated grants.
- expression: api.getAttribute('iam.googleapis.com/modifiedGrantsByRole', []).hasOnly(['roles/composer.sharedVpcAgent','roles/compute.networkUser','roles/compute.networkViewer','roles/container.hostServiceAgentUser','roles/multiclusterservicediscovery.serviceAgent','roles/vpcaccess.user'])
- title: dev_stage3_sa_delegated_grants
+ ? module.dev-spoke-project.google_project_iam_binding.bindings["sa_delegated_grants"]
+ : condition:
+ - description: Development host project delegated grants.
+ expression: api.getAttribute('iam.googleapis.com/modifiedGrantsByRole', []).hasOnly(['roles/composer.sharedVpcAgent','roles/compute.networkUser','roles/compute.networkViewer','roles/container.hostServiceAgentUser','roles/multiclusterservicediscovery.serviceAgent','roles/vpcaccess.user'])
+ title: dev_stage3_sa_delegated_grants
members:
- - serviceAccount:string
+ - serviceAccount:string
project: fast2-dev-net-spoke-0
role: roles/resourcemanager.projectIamAdmin
module.dev-spoke-project.google_project_iam_member.servicenetworking[0]:
condition: []
project: fast2-dev-net-spoke-0
role: roles/servicenetworking.serviceAgent
- module.dev-spoke-project.google_project_service.project_services["compute.googleapis.com"]:
- disable_dependent_services: false
+ ? module.dev-spoke-project.google_project_service.project_services["compute.googleapis.com"]
+ : disable_dependent_services: false
disable_on_destroy: false
project: fast2-dev-net-spoke-0
service: compute.googleapis.com
timeouts: null
- module.dev-spoke-project.google_project_service.project_services["dns.googleapis.com"]:
- disable_dependent_services: false
+ ? module.dev-spoke-project.google_project_service.project_services["dns.googleapis.com"]
+ : disable_dependent_services: false
disable_on_destroy: false
project: fast2-dev-net-spoke-0
service: dns.googleapis.com
timeouts: null
- module.dev-spoke-project.google_project_service.project_services["iap.googleapis.com"]:
- disable_dependent_services: false
+ ? module.dev-spoke-project.google_project_service.project_services["iap.googleapis.com"]
+ : disable_dependent_services: false
disable_on_destroy: false
project: fast2-dev-net-spoke-0
service: iap.googleapis.com
timeouts: null
- module.dev-spoke-project.google_project_service.project_services["networkmanagement.googleapis.com"]:
- disable_dependent_services: false
+ ? module.dev-spoke-project.google_project_service.project_services["networkmanagement.googleapis.com"]
+ : disable_dependent_services: false
disable_on_destroy: false
project: fast2-dev-net-spoke-0
service: networkmanagement.googleapis.com
timeouts: null
- module.dev-spoke-project.google_project_service.project_services["servicenetworking.googleapis.com"]:
- disable_dependent_services: false
+ ? module.dev-spoke-project.google_project_service.project_services["servicenetworking.googleapis.com"]
+ : disable_dependent_services: false
disable_on_destroy: false
project: fast2-dev-net-spoke-0
service: servicenetworking.googleapis.com
timeouts: null
- module.dev-spoke-project.google_project_service.project_services["stackdriver.googleapis.com"]:
- disable_dependent_services: false
+ ? module.dev-spoke-project.google_project_service.project_services["stackdriver.googleapis.com"]
+ : disable_dependent_services: false
disable_on_destroy: false
project: fast2-dev-net-spoke-0
service: stackdriver.googleapis.com
timeouts: null
- module.dev-spoke-project.google_project_service.project_services["vpcaccess.googleapis.com"]:
- disable_dependent_services: false
+ ? module.dev-spoke-project.google_project_service.project_services["vpcaccess.googleapis.com"]
+ : disable_dependent_services: false
disable_on_destroy: false
project: fast2-dev-net-spoke-0
service: vpcaccess.googleapis.com
timeouts: null
- module.dev-spoke-project.google_project_service_identity.jit_si["iap.googleapis.com"]:
- project: fast2-dev-net-spoke-0
+ ? module.dev-spoke-project.google_project_service_identity.jit_si["iap.googleapis.com"]
+ : project: fast2-dev-net-spoke-0
service: iap.googleapis.com
timeouts: null
module.dev-spoke-project.google_project_service_identity.servicenetworking[0]:
@@ -519,8 +524,8 @@ values:
project: fast2-dev-net-spoke-0
tags: null
timeouts: null
- module.dev-spoke-vpc.google_compute_subnetwork.subnetwork["europe-west1/dev-dataplatform"]:
- description: Default subnet for dev Data Platform
+ ? module.dev-spoke-vpc.google_compute_subnetwork.subnetwork["europe-west1/dev-dataplatform"]
+ : description: Default subnet for dev Data Platform
ip_cidr_range: 10.68.2.0/24
ipv6_access_type: null
log_config: []
@@ -531,13 +536,13 @@ values:
region: europe-west1
role: null
secondary_ip_range:
- - ip_cidr_range: 100.69.0.0/16
- range_name: pods
- - ip_cidr_range: 100.71.2.0/24
- range_name: services
+ - ip_cidr_range: 100.69.0.0/16
+ range_name: pods
+ - ip_cidr_range: 100.71.2.0/24
+ range_name: services
timeouts: null
- module.dev-spoke-vpc.google_compute_subnetwork.subnetwork["europe-west1/dev-default"]:
- description: Default europe-west1 subnet for dev
+ ? module.dev-spoke-vpc.google_compute_subnetwork.subnetwork["europe-west1/dev-default"]
+ : description: Default europe-west1 subnet for dev
ip_cidr_range: 10.68.0.0/24
ipv6_access_type: null
log_config: []
@@ -547,10 +552,9 @@ values:
project: fast2-dev-net-spoke-0
region: europe-west1
role: null
- secondary_ip_range: []
timeouts: null
- module.dev-spoke-vpc.google_compute_subnetwork.subnetwork["europe-west1/dev-gke-nodes"]:
- description: Default subnet for prod gke nodes
+ ? module.dev-spoke-vpc.google_compute_subnetwork.subnetwork["europe-west1/dev-gke-nodes"]
+ : description: Default subnet for prod gke nodes
ip_cidr_range: 10.68.1.0/24
ipv6_access_type: null
log_config: []
@@ -561,13 +565,13 @@ values:
region: europe-west1
role: null
secondary_ip_range:
- - ip_cidr_range: 100.68.0.0/16
- range_name: pods
- - ip_cidr_range: 100.71.1.0/24
- range_name: services
+ - ip_cidr_range: 100.68.0.0/16
+ range_name: pods
+ - ip_cidr_range: 100.71.1.0/24
+ range_name: services
timeouts: null
- module.dev-spoke-vpc.google_compute_subnetwork.subnetwork["europe-west4/dev-default"]:
- description: Default europe-west4 subnet for dev
+ ? module.dev-spoke-vpc.google_compute_subnetwork.subnetwork["europe-west4/dev-default"]
+ : description: Default europe-west4 subnet for dev
ip_cidr_range: 10.84.0.0/24
ipv6_access_type: null
log_config: []
@@ -577,7 +581,6 @@ values:
project: fast2-dev-net-spoke-0
region: europe-west4
role: null
- secondary_ip_range: []
timeouts: null
module.dev-spoke-vpc.google_dns_policy.default[0]:
alternative_name_server_config: []
@@ -586,14 +589,14 @@ values:
enable_logging: true
name: dev-spoke-0
networks:
- - {}
+ - {}
project: fast2-dev-net-spoke-0
timeouts: null
- module.dmz-firewall.google_compute_firewall.custom-rules["allow-hc-nva-ssh-dmz"]:
- allow:
- - ports:
- - '22'
- protocol: tcp
+ ? module.dmz-firewall.google_compute_firewall.custom-rules["allow-hc-nva-ssh-dmz"]
+ : allow:
+ - ports:
+ - "22"
+ protocol: tcp
deny: []
description: Allow traffic from Google healthchecks to NVA appliances
direction: INGRESS
@@ -604,20 +607,20 @@ values:
priority: 1000
project: fast2-prod-net-landing-0
source_ranges:
- - 130.211.0.0/22
- - 209.85.152.0/22
- - 209.85.204.0/22
- - 35.191.0.0/16
+ - 130.211.0.0/22
+ - 209.85.152.0/22
+ - 209.85.204.0/22
+ - 35.191.0.0/16
source_service_accounts: null
source_tags: null
target_service_accounts: null
target_tags: null
timeouts: null
- module.dmz-firewall.google_compute_firewall.custom-rules["allow-ncc-nva-bgp-dmz"]:
- allow:
- - ports:
- - '179'
- protocol: tcp
+ ? module.dmz-firewall.google_compute_firewall.custom-rules["allow-ncc-nva-bgp-dmz"]
+ : allow:
+ - ports:
+ - "179"
+ protocol: tcp
deny: []
description: Allow BGP traffic from NCC Cloud Routers to NVAs
direction: INGRESS
@@ -628,21 +631,21 @@ values:
priority: 1000
project: fast2-prod-net-landing-0
source_ranges:
- - 10.128.0.201/32
- - 10.128.0.202/32
- - 10.128.32.201/32
- - 10.128.32.202/32
+ - 10.128.0.201/32
+ - 10.128.0.202/32
+ - 10.128.32.201/32
+ - 10.128.32.202/32
source_service_accounts: null
source_tags: null
target_service_accounts: null
target_tags:
- - nva
+ - nva
timeouts: null
- module.dmz-firewall.google_compute_firewall.custom-rules["allow-nva-nva-bgp-dmz"]:
- allow:
- - ports:
- - '179'
- protocol: tcp
+ ? module.dmz-firewall.google_compute_firewall.custom-rules["allow-nva-nva-bgp-dmz"]
+ : allow:
+ - ports:
+ - "179"
+ protocol: tcp
deny: []
description: Allow BGP traffic from cross-regional NVAs
direction: INGRESS
@@ -655,27 +658,27 @@ values:
source_ranges: null
source_service_accounts: null
source_tags:
- - nva
+ - nva
target_service_accounts: null
target_tags:
- - nva
+ - nva
timeouts: null
- module.dmz-firewall.google_compute_firewall.custom-rules["dmz-ingress-default-deny"]:
- allow: []
+ ? module.dmz-firewall.google_compute_firewall.custom-rules["dmz-ingress-default-deny"]
+ : allow: []
deny:
- - ports: []
- protocol: all
+ - ports: []
+ protocol: all
description: Deny and log any unmatched ingress traffic.
direction: INGRESS
disabled: false
log_config:
- - metadata: EXCLUDE_ALL_METADATA
+ - metadata: EXCLUDE_ALL_METADATA
name: dmz-ingress-default-deny
network: prod-dmz-0
priority: 65535
project: fast2-prod-net-landing-0
source_ranges:
- - 0.0.0.0/0
+ - 0.0.0.0/0
source_service_accounts: null
source_tags: null
target_service_accounts: null
@@ -692,8 +695,8 @@ values:
project: fast2-prod-net-landing-0
routing_mode: GLOBAL
timeouts: null
- module.dmz-vpc.google_compute_subnetwork.subnetwork["europe-west1/dmz-default"]:
- description: Default europe-west1 subnet for DMZ
+ ? module.dmz-vpc.google_compute_subnetwork.subnetwork["europe-west1/dmz-default"]
+ : description: Default europe-west1 subnet for DMZ
ip_cidr_range: 10.64.128.0/24
ipv6_access_type: null
log_config: []
@@ -703,10 +706,9 @@ values:
project: fast2-prod-net-landing-0
region: europe-west1
role: null
- secondary_ip_range: []
timeouts: null
- module.dmz-vpc.google_compute_subnetwork.subnetwork["europe-west4/dmz-default"]:
- description: Default europe-west4 subnet for DMZ
+ ? module.dmz-vpc.google_compute_subnetwork.subnetwork["europe-west4/dmz-default"]
+ : description: Default europe-west4 subnet for DMZ
ip_cidr_range: 10.80.128.0/24
ipv6_access_type: null
log_config: []
@@ -716,7 +718,6 @@ values:
project: fast2-prod-net-landing-0
region: europe-west4
role: null
- secondary_ip_range: []
timeouts: null
module.dmz-vpc.google_dns_policy.default[0]:
alternative_name_server_config: []
@@ -725,117 +726,117 @@ values:
enable_logging: true
name: prod-dmz-0
networks:
- - {}
+ - {}
project: fast2-prod-net-landing-0
timeouts: null
module.firewall-policy-default.google_compute_firewall_policy.hierarchical[0]:
description: null
short_name: net-default
timeouts: null
- module.firewall-policy-default.google_compute_firewall_policy_rule.hierarchical["ingress/allow-healthchecks"]:
- action: allow
+ ? module.firewall-policy-default.google_compute_firewall_policy_rule.hierarchical["ingress/allow-healthchecks"]
+ : action: allow
description: Enable SSH, HTTP and HTTPS healthchecks
direction: INGRESS
disabled: false
enable_logging: null
match:
- - dest_address_groups: null
- dest_fqdns: null
- dest_ip_ranges: null
- dest_region_codes: null
- dest_threat_intelligences: null
- layer4_configs:
- - ip_protocol: tcp
- ports:
- - '22'
- - '80'
- - '443'
- src_address_groups: null
- src_fqdns: null
- src_ip_ranges:
- - 35.191.0.0/16
- - 130.211.0.0/22
- - 209.85.152.0/22
- - 209.85.204.0/22
- src_region_codes: null
- src_threat_intelligences: null
+ - dest_address_groups: null
+ dest_fqdns: null
+ dest_ip_ranges: null
+ dest_region_codes: null
+ dest_threat_intelligences: null
+ layer4_configs:
+ - ip_protocol: tcp
+ ports:
+ - "22"
+ - "80"
+ - "443"
+ src_address_groups: null
+ src_fqdns: null
+ src_ip_ranges:
+ - 35.191.0.0/16
+ - 130.211.0.0/22
+ - 209.85.152.0/22
+ - 209.85.204.0/22
+ src_region_codes: null
+ src_threat_intelligences: null
priority: 1001
target_resources: null
target_service_accounts: null
timeouts: null
- module.firewall-policy-default.google_compute_firewall_policy_rule.hierarchical["ingress/allow-icmp"]:
- action: allow
+ ? module.firewall-policy-default.google_compute_firewall_policy_rule.hierarchical["ingress/allow-icmp"]
+ : action: allow
description: Enable ICMP
direction: INGRESS
disabled: false
enable_logging: null
match:
- - dest_address_groups: null
- dest_fqdns: null
- dest_ip_ranges: null
- dest_region_codes: null
- dest_threat_intelligences: null
- layer4_configs:
- - ip_protocol: icmp
- ports: []
- src_address_groups: null
- src_fqdns: null
- src_ip_ranges:
- - 0.0.0.0/0
- src_region_codes: null
- src_threat_intelligences: null
+ - dest_address_groups: null
+ dest_fqdns: null
+ dest_ip_ranges: null
+ dest_region_codes: null
+ dest_threat_intelligences: null
+ layer4_configs:
+ - ip_protocol: icmp
+ ports: []
+ src_address_groups: null
+ src_fqdns: null
+ src_ip_ranges:
+ - 0.0.0.0/0
+ src_region_codes: null
+ src_threat_intelligences: null
priority: 1003
target_resources: null
target_service_accounts: null
timeouts: null
- module.firewall-policy-default.google_compute_firewall_policy_rule.hierarchical["ingress/allow-nat-ranges"]:
- action: allow
+ ? module.firewall-policy-default.google_compute_firewall_policy_rule.hierarchical["ingress/allow-nat-ranges"]
+ : action: allow
description: Enable NAT ranges for VPC serverless connector
direction: INGRESS
disabled: false
enable_logging: null
match:
- - dest_address_groups: null
- dest_fqdns: null
- dest_ip_ranges: null
- dest_region_codes: null
- dest_threat_intelligences: null
- layer4_configs:
- - ip_protocol: all
- ports: null
- src_address_groups: null
- src_fqdns: null
- src_ip_ranges:
- - 107.178.230.64/26
- - 35.199.224.0/19
- src_region_codes: null
- src_threat_intelligences: null
+ - dest_address_groups: null
+ dest_fqdns: null
+ dest_ip_ranges: null
+ dest_region_codes: null
+ dest_threat_intelligences: null
+ layer4_configs:
+ - ip_protocol: all
+ ports: null
+ src_address_groups: null
+ src_fqdns: null
+ src_ip_ranges:
+ - 107.178.230.64/26
+ - 35.199.224.0/19
+ src_region_codes: null
+ src_threat_intelligences: null
priority: 1004
target_resources: null
target_service_accounts: null
timeouts: null
- module.firewall-policy-default.google_compute_firewall_policy_rule.hierarchical["ingress/allow-ssh-from-iap"]:
- action: allow
+ ? module.firewall-policy-default.google_compute_firewall_policy_rule.hierarchical["ingress/allow-ssh-from-iap"]
+ : action: allow
description: Enable SSH from IAP
direction: INGRESS
disabled: false
enable_logging: true
match:
- - dest_address_groups: null
- dest_fqdns: null
- dest_ip_ranges: null
- dest_region_codes: null
- dest_threat_intelligences: null
- layer4_configs:
- - ip_protocol: tcp
- ports:
- - '22'
- src_address_groups: null
- src_fqdns: null
- src_ip_ranges:
- - 35.235.240.0/20
- src_region_codes: null
- src_threat_intelligences: null
+ - dest_address_groups: null
+ dest_fqdns: null
+ dest_ip_ranges: null
+ dest_region_codes: null
+ dest_threat_intelligences: null
+ layer4_configs:
+ - ip_protocol: tcp
+ ports:
+ - "22"
+ src_address_groups: null
+ src_fqdns: null
+ src_ip_ranges:
+ - 35.235.240.0/20
+ src_region_codes: null
+ src_threat_intelligences: null
priority: 1002
target_resources: null
target_service_accounts: null
@@ -843,27 +844,27 @@ values:
module.folder.google_compute_firewall_policy_association.default[0]:
name: default
timeouts: null
- module.folder.google_essential_contacts_contact.contact["gcp-network-admins@fast.example.com"]:
- email: gcp-network-admins@fast.example.com
+ ? module.folder.google_essential_contacts_contact.contact["gcp-network-admins@fast.example.com"]
+ : email: gcp-network-admins@fast.example.com
language_tag: en
notification_category_subscriptions:
- - ALL
+ - ALL
timeouts: null
module.folder.google_folder.folder[0]:
display_name: Networking
parent: organizations/123456789012
timeouts: null
- module.landing-dns-fwd-onprem-example[0].google_dns_managed_zone.dns_managed_zone[0]:
- cloud_logging_config:
- - enable_logging: false
+ ? module.landing-dns-fwd-onprem-example[0].google_dns_managed_zone.dns_managed_zone[0]
+ : cloud_logging_config:
+ - enable_logging: false
description: Terraform managed.
dns_name: onprem.example.com.
dnssec_config: []
force_destroy: false
forwarding_config:
- - target_name_servers:
- - forwarding_path: ''
- ipv4_address: 10.10.10.10
+ - target_name_servers:
+ - forwarding_path: ""
+ ipv4_address: 10.10.10.10
labels: null
name: example-com
peering_config: []
@@ -872,17 +873,17 @@ values:
service_directory_config: []
timeouts: null
visibility: private
- module.landing-dns-fwd-onprem-rev-10[0].google_dns_managed_zone.dns_managed_zone[0]:
- cloud_logging_config:
- - enable_logging: false
+ ? module.landing-dns-fwd-onprem-rev-10[0].google_dns_managed_zone.dns_managed_zone[0]
+ : cloud_logging_config:
+ - enable_logging: false
description: Terraform managed.
dns_name: 10.in-addr.arpa.
dnssec_config: []
force_destroy: false
forwarding_config:
- - target_name_servers:
- - forwarding_path: ''
- ipv4_address: 10.10.10.10
+ - target_name_servers:
+ - forwarding_path: ""
+ ipv4_address: 10.10.10.10
labels: null
name: root-reverse-10
peering_config: []
@@ -895,496 +896,496 @@ values:
description: Terraform managed.
gke_clusters: []
networks:
- - {}
- - {}
+ - {}
+ - {}
project: fast2-prod-net-landing-0
response_policy_name: googleapis
timeouts: null
- module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["accounts"]:
- behavior: null
+ ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["accounts"]
+ : behavior: null
dns_name: accounts.google.com.
local_data:
- - local_datas:
- - name: accounts.google.com.
- rrdatas:
- - private.googleapis.com.
- ttl: null
- type: CNAME
+ - local_datas:
+ - name: accounts.google.com.
+ rrdatas:
+ - private.googleapis.com.
+ ttl: null
+ type: CNAME
project: fast2-prod-net-landing-0
response_policy: googleapis
rule_name: accounts
timeouts: null
- module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["backupdr-cloud"]:
- behavior: null
+ ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["backupdr-cloud"]
+ : behavior: null
dns_name: backupdr.cloud.google.com.
local_data:
- - local_datas:
- - name: backupdr.cloud.google.com.
- rrdatas:
- - private.googleapis.com.
- ttl: null
- type: CNAME
+ - local_datas:
+ - name: backupdr.cloud.google.com.
+ rrdatas:
+ - private.googleapis.com.
+ ttl: null
+ type: CNAME
project: fast2-prod-net-landing-0
response_policy: googleapis
rule_name: backupdr-cloud
timeouts: null
- module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["backupdr-cloud-all"]:
- behavior: null
- dns_name: '*.backupdr.cloud.google.com.'
+ ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["backupdr-cloud-all"]
+ : behavior: null
+ dns_name: "*.backupdr.cloud.google.com."
local_data:
- - local_datas:
- - name: '*.backupdr.cloud.google.com.'
- rrdatas:
- - private.googleapis.com.
- ttl: null
- type: CNAME
+ - local_datas:
+ - name: "*.backupdr.cloud.google.com."
+ rrdatas:
+ - private.googleapis.com.
+ ttl: null
+ type: CNAME
project: fast2-prod-net-landing-0
response_policy: googleapis
rule_name: backupdr-cloud-all
timeouts: null
- module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["backupdr-gu"]:
- behavior: null
+ ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["backupdr-gu"]
+ : behavior: null
dns_name: backupdr.googleusercontent.google.com.
local_data:
- - local_datas:
- - name: backupdr.googleusercontent.google.com.
- rrdatas:
- - private.googleapis.com.
- ttl: null
- type: CNAME
+ - local_datas:
+ - name: backupdr.googleusercontent.google.com.
+ rrdatas:
+ - private.googleapis.com.
+ ttl: null
+ type: CNAME
project: fast2-prod-net-landing-0
response_policy: googleapis
rule_name: backupdr-gu
timeouts: null
- module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["backupdr-gu-all"]:
- behavior: null
- dns_name: '*.backupdr.googleusercontent.google.com.'
+ ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["backupdr-gu-all"]
+ : behavior: null
+ dns_name: "*.backupdr.googleusercontent.google.com."
local_data:
- - local_datas:
- - name: '*.backupdr.googleusercontent.google.com.'
- rrdatas:
- - private.googleapis.com.
- ttl: null
- type: CNAME
+ - local_datas:
+ - name: "*.backupdr.googleusercontent.google.com."
+ rrdatas:
+ - private.googleapis.com.
+ ttl: null
+ type: CNAME
project: fast2-prod-net-landing-0
response_policy: googleapis
rule_name: backupdr-gu-all
timeouts: null
- module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["cloudfunctions"]:
- behavior: null
- dns_name: '*.cloudfunctions.net.'
+ ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["cloudfunctions"]
+ : behavior: null
+ dns_name: "*.cloudfunctions.net."
local_data:
- - local_datas:
- - name: '*.cloudfunctions.net.'
- rrdatas:
- - private.googleapis.com.
- ttl: null
- type: CNAME
+ - local_datas:
+ - name: "*.cloudfunctions.net."
+ rrdatas:
+ - private.googleapis.com.
+ ttl: null
+ type: CNAME
project: fast2-prod-net-landing-0
response_policy: googleapis
rule_name: cloudfunctions
timeouts: null
- module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["cloudproxy"]:
- behavior: null
- dns_name: '*.cloudproxy.app.'
+ ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["cloudproxy"]
+ : behavior: null
+ dns_name: "*.cloudproxy.app."
local_data:
- - local_datas:
- - name: '*.cloudproxy.app.'
- rrdatas:
- - private.googleapis.com.
- ttl: null
- type: CNAME
+ - local_datas:
+ - name: "*.cloudproxy.app."
+ rrdatas:
+ - private.googleapis.com.
+ ttl: null
+ type: CNAME
project: fast2-prod-net-landing-0
response_policy: googleapis
rule_name: cloudproxy
timeouts: null
- module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["composer-cloud-all"]:
- behavior: null
- dns_name: '*.composer.cloud.google.com.'
+ ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["composer-cloud-all"]
+ : behavior: null
+ dns_name: "*.composer.cloud.google.com."
local_data:
- - local_datas:
- - name: '*.composer.cloud.google.com.'
- rrdatas:
- - private.googleapis.com.
- ttl: null
- type: CNAME
+ - local_datas:
+ - name: "*.composer.cloud.google.com."
+ rrdatas:
+ - private.googleapis.com.
+ ttl: null
+ type: CNAME
project: fast2-prod-net-landing-0
response_policy: googleapis
rule_name: composer-cloud-all
timeouts: null
- module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["composer-gu-all"]:
- behavior: null
- dns_name: '*.composer.googleusercontent.com.'
+ ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["composer-gu-all"]
+ : behavior: null
+ dns_name: "*.composer.googleusercontent.com."
local_data:
- - local_datas:
- - name: '*.composer.googleusercontent.com.'
- rrdatas:
- - private.googleapis.com.
- ttl: null
- type: CNAME
+ - local_datas:
+ - name: "*.composer.googleusercontent.com."
+ rrdatas:
+ - private.googleapis.com.
+ ttl: null
+ type: CNAME
project: fast2-prod-net-landing-0
response_policy: googleapis
rule_name: composer-gu-all
timeouts: null
- module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["datafusion-all"]:
- behavior: null
- dns_name: '*.datafusion.cloud.google.com.'
+ ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["datafusion-all"]
+ : behavior: null
+ dns_name: "*.datafusion.cloud.google.com."
local_data:
- - local_datas:
- - name: '*.datafusion.cloud.google.com.'
- rrdatas:
- - private.googleapis.com.
- ttl: null
- type: CNAME
+ - local_datas:
+ - name: "*.datafusion.cloud.google.com."
+ rrdatas:
+ - private.googleapis.com.
+ ttl: null
+ type: CNAME
project: fast2-prod-net-landing-0
response_policy: googleapis
rule_name: datafusion-all
timeouts: null
- module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["datafusion-gu-all"]:
- behavior: null
- dns_name: '*.datafusion.googleusercontent.com.'
+ ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["datafusion-gu-all"]
+ : behavior: null
+ dns_name: "*.datafusion.googleusercontent.com."
local_data:
- - local_datas:
- - name: '*.datafusion.googleusercontent.com.'
- rrdatas:
- - private.googleapis.com.
- ttl: null
- type: CNAME
+ - local_datas:
+ - name: "*.datafusion.googleusercontent.com."
+ rrdatas:
+ - private.googleapis.com.
+ ttl: null
+ type: CNAME
project: fast2-prod-net-landing-0
response_policy: googleapis
rule_name: datafusion-gu-all
timeouts: null
- module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["dataproc"]:
- behavior: null
+ ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["dataproc"]
+ : behavior: null
dns_name: dataproc.cloud.google.com.
local_data:
- - local_datas:
- - name: dataproc.cloud.google.com.
- rrdatas:
- - private.googleapis.com.
- ttl: null
- type: CNAME
+ - local_datas:
+ - name: dataproc.cloud.google.com.
+ rrdatas:
+ - private.googleapis.com.
+ ttl: null
+ type: CNAME
project: fast2-prod-net-landing-0
response_policy: googleapis
rule_name: dataproc
timeouts: null
- module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["dataproc-all"]:
- behavior: null
- dns_name: '*.dataproc.cloud.google.com.'
+ ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["dataproc-all"]
+ : behavior: null
+ dns_name: "*.dataproc.cloud.google.com."
local_data:
- - local_datas:
- - name: '*.dataproc.cloud.google.com.'
- rrdatas:
- - private.googleapis.com.
- ttl: null
- type: CNAME
+ - local_datas:
+ - name: "*.dataproc.cloud.google.com."
+ rrdatas:
+ - private.googleapis.com.
+ ttl: null
+ type: CNAME
project: fast2-prod-net-landing-0
response_policy: googleapis
rule_name: dataproc-all
timeouts: null
- module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["dataproc-gu"]:
- behavior: null
+ ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["dataproc-gu"]
+ : behavior: null
dns_name: dataproc.googleusercontent.com.
local_data:
- - local_datas:
- - name: dataproc.googleusercontent.com.
- rrdatas:
- - private.googleapis.com.
- ttl: null
- type: CNAME
+ - local_datas:
+ - name: dataproc.googleusercontent.com.
+ rrdatas:
+ - private.googleapis.com.
+ ttl: null
+ type: CNAME
project: fast2-prod-net-landing-0
response_policy: googleapis
rule_name: dataproc-gu
timeouts: null
- module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["dataproc-gu-all"]:
- behavior: null
- dns_name: '*.dataproc.googleusercontent.com.'
+ ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["dataproc-gu-all"]
+ : behavior: null
+ dns_name: "*.dataproc.googleusercontent.com."
local_data:
- - local_datas:
- - name: '*.dataproc.googleusercontent.com.'
- rrdatas:
- - private.googleapis.com.
- ttl: null
- type: CNAME
+ - local_datas:
+ - name: "*.dataproc.googleusercontent.com."
+ rrdatas:
+ - private.googleapis.com.
+ ttl: null
+ type: CNAME
project: fast2-prod-net-landing-0
response_policy: googleapis
rule_name: dataproc-gu-all
timeouts: null
- module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["dl"]:
- behavior: null
+ ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["dl"]
+ : behavior: null
dns_name: dl.google.com.
local_data:
- - local_datas:
- - name: dl.google.com.
- rrdatas:
- - private.googleapis.com.
- ttl: null
- type: CNAME
+ - local_datas:
+ - name: dl.google.com.
+ rrdatas:
+ - private.googleapis.com.
+ ttl: null
+ type: CNAME
project: fast2-prod-net-landing-0
response_policy: googleapis
rule_name: dl
timeouts: null
- module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["gcr"]:
- behavior: null
+ ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["gcr"]
+ : behavior: null
dns_name: gcr.io.
local_data:
- - local_datas:
- - name: gcr.io.
- rrdatas:
- - private.googleapis.com.
- ttl: null
- type: CNAME
+ - local_datas:
+ - name: gcr.io.
+ rrdatas:
+ - private.googleapis.com.
+ ttl: null
+ type: CNAME
project: fast2-prod-net-landing-0
response_policy: googleapis
rule_name: gcr
timeouts: null
- module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["gcr-all"]:
- behavior: null
- dns_name: '*.gcr.io.'
+ ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["gcr-all"]
+ : behavior: null
+ dns_name: "*.gcr.io."
local_data:
- - local_datas:
- - name: '*.gcr.io.'
- rrdatas:
- - private.googleapis.com.
- ttl: null
- type: CNAME
+ - local_datas:
+ - name: "*.gcr.io."
+ rrdatas:
+ - private.googleapis.com.
+ ttl: null
+ type: CNAME
project: fast2-prod-net-landing-0
response_policy: googleapis
rule_name: gcr-all
timeouts: null
- module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["googleapis-all"]:
- behavior: null
- dns_name: '*.googleapis.com.'
+ ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["googleapis-all"]
+ : behavior: null
+ dns_name: "*.googleapis.com."
local_data:
- - local_datas:
- - name: '*.googleapis.com.'
- rrdatas:
- - private.googleapis.com.
- ttl: null
- type: CNAME
+ - local_datas:
+ - name: "*.googleapis.com."
+ rrdatas:
+ - private.googleapis.com.
+ ttl: null
+ type: CNAME
project: fast2-prod-net-landing-0
response_policy: googleapis
rule_name: googleapis-all
timeouts: null
- module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["googleapis-private"]:
- behavior: null
+ ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["googleapis-private"]
+ : behavior: null
dns_name: private.googleapis.com.
local_data:
- - local_datas:
- - name: private.googleapis.com.
- rrdatas:
- - 199.36.153.8
- - 199.36.153.9
- - 199.36.153.10
- - 199.36.153.11
- ttl: null
- type: A
+ - local_datas:
+ - name: private.googleapis.com.
+ rrdatas:
+ - 199.36.153.8
+ - 199.36.153.9
+ - 199.36.153.10
+ - 199.36.153.11
+ ttl: null
+ type: A
project: fast2-prod-net-landing-0
response_policy: googleapis
rule_name: googleapis-private
timeouts: null
- module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["googleapis-restricted"]:
- behavior: null
+ ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["googleapis-restricted"]
+ : behavior: null
dns_name: restricted.googleapis.com.
local_data:
- - local_datas:
- - name: restricted.googleapis.com.
- rrdatas:
- - 199.36.153.4
- - 199.36.153.5
- - 199.36.153.6
- - 199.36.153.7
- ttl: null
- type: A
+ - local_datas:
+ - name: restricted.googleapis.com.
+ rrdatas:
+ - 199.36.153.4
+ - 199.36.153.5
+ - 199.36.153.6
+ - 199.36.153.7
+ ttl: null
+ type: A
project: fast2-prod-net-landing-0
response_policy: googleapis
rule_name: googleapis-restricted
timeouts: null
- module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["gstatic-all"]:
- behavior: null
- dns_name: '*.gstatic.com.'
+ ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["gstatic-all"]
+ : behavior: null
+ dns_name: "*.gstatic.com."
local_data:
- - local_datas:
- - name: '*.gstatic.com.'
- rrdatas:
- - private.googleapis.com.
- ttl: null
- type: CNAME
+ - local_datas:
+ - name: "*.gstatic.com."
+ rrdatas:
+ - private.googleapis.com.
+ ttl: null
+ type: CNAME
project: fast2-prod-net-landing-0
response_policy: googleapis
rule_name: gstatic-all
timeouts: null
- module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["kernels-gu"]:
- behavior: null
+ ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["kernels-gu"]
+ : behavior: null
dns_name: kernels.googleusercontent.com.
local_data:
- - local_datas:
- - name: kernels.googleusercontent.com.
- rrdatas:
- - private.googleapis.com.
- ttl: null
- type: CNAME
+ - local_datas:
+ - name: kernels.googleusercontent.com.
+ rrdatas:
+ - private.googleapis.com.
+ ttl: null
+ type: CNAME
project: fast2-prod-net-landing-0
response_policy: googleapis
rule_name: kernels-gu
timeouts: null
- module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["kernels-gu-all"]:
- behavior: null
- dns_name: '*.kernels.googleusercontent.com.'
+ ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["kernels-gu-all"]
+ : behavior: null
+ dns_name: "*.kernels.googleusercontent.com."
local_data:
- - local_datas:
- - name: '*.kernels.googleusercontent.com.'
- rrdatas:
- - private.googleapis.com.
- ttl: null
- type: CNAME
+ - local_datas:
+ - name: "*.kernels.googleusercontent.com."
+ rrdatas:
+ - private.googleapis.com.
+ ttl: null
+ type: CNAME
project: fast2-prod-net-landing-0
response_policy: googleapis
rule_name: kernels-gu-all
timeouts: null
- module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["notebooks-all"]:
- behavior: null
- dns_name: '*.notebooks.cloud.google.com.'
+ ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["notebooks-all"]
+ : behavior: null
+ dns_name: "*.notebooks.cloud.google.com."
local_data:
- - local_datas:
- - name: '*.notebooks.cloud.google.com.'
- rrdatas:
- - private.googleapis.com.
- ttl: null
- type: CNAME
+ - local_datas:
+ - name: "*.notebooks.cloud.google.com."
+ rrdatas:
+ - private.googleapis.com.
+ ttl: null
+ type: CNAME
project: fast2-prod-net-landing-0
response_policy: googleapis
rule_name: notebooks-all
timeouts: null
- module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["notebooks-gu-all"]:
- behavior: null
- dns_name: '*.notebooks.googleusercontent.com.'
+ ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["notebooks-gu-all"]
+ : behavior: null
+ dns_name: "*.notebooks.googleusercontent.com."
local_data:
- - local_datas:
- - name: '*.notebooks.googleusercontent.com.'
- rrdatas:
- - private.googleapis.com.
- ttl: null
- type: CNAME
+ - local_datas:
+ - name: "*.notebooks.googleusercontent.com."
+ rrdatas:
+ - private.googleapis.com.
+ ttl: null
+ type: CNAME
project: fast2-prod-net-landing-0
response_policy: googleapis
rule_name: notebooks-gu-all
timeouts: null
- module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["packages-cloud"]:
- behavior: null
+ ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["packages-cloud"]
+ : behavior: null
dns_name: packages.cloud.google.com.
local_data:
- - local_datas:
- - name: packages.cloud.google.com.
- rrdatas:
- - private.googleapis.com.
- ttl: null
- type: CNAME
+ - local_datas:
+ - name: packages.cloud.google.com.
+ rrdatas:
+ - private.googleapis.com.
+ ttl: null
+ type: CNAME
project: fast2-prod-net-landing-0
response_policy: googleapis
rule_name: packages-cloud
timeouts: null
- module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["packages-cloud-all"]:
- behavior: null
- dns_name: '*.packages.cloud.google.com.'
+ ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["packages-cloud-all"]
+ : behavior: null
+ dns_name: "*.packages.cloud.google.com."
local_data:
- - local_datas:
- - name: '*.packages.cloud.google.com.'
- rrdatas:
- - private.googleapis.com.
- ttl: null
- type: CNAME
+ - local_datas:
+ - name: "*.packages.cloud.google.com."
+ rrdatas:
+ - private.googleapis.com.
+ ttl: null
+ type: CNAME
project: fast2-prod-net-landing-0
response_policy: googleapis
rule_name: packages-cloud-all
timeouts: null
- module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["pkgdev"]:
- behavior: null
+ ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["pkgdev"]
+ : behavior: null
dns_name: pkg.dev.
local_data:
- - local_datas:
- - name: pkg.dev.
- rrdatas:
- - private.googleapis.com.
- ttl: null
- type: CNAME
+ - local_datas:
+ - name: pkg.dev.
+ rrdatas:
+ - private.googleapis.com.
+ ttl: null
+ type: CNAME
project: fast2-prod-net-landing-0
response_policy: googleapis
rule_name: pkgdev
timeouts: null
- module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["pkgdev-all"]:
- behavior: null
- dns_name: '*.pkg.dev.'
+ ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["pkgdev-all"]
+ : behavior: null
+ dns_name: "*.pkg.dev."
local_data:
- - local_datas:
- - name: '*.pkg.dev.'
- rrdatas:
- - private.googleapis.com.
- ttl: null
- type: CNAME
+ - local_datas:
+ - name: "*.pkg.dev."
+ rrdatas:
+ - private.googleapis.com.
+ ttl: null
+ type: CNAME
project: fast2-prod-net-landing-0
response_policy: googleapis
rule_name: pkgdev-all
timeouts: null
- module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["pkigoog"]:
- behavior: null
+ ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["pkigoog"]
+ : behavior: null
dns_name: pki.goog.
local_data:
- - local_datas:
- - name: pki.goog.
- rrdatas:
- - private.googleapis.com.
- ttl: null
- type: CNAME
+ - local_datas:
+ - name: pki.goog.
+ rrdatas:
+ - private.googleapis.com.
+ ttl: null
+ type: CNAME
project: fast2-prod-net-landing-0
response_policy: googleapis
rule_name: pkigoog
timeouts: null
- module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["pkigoog-all"]:
- behavior: null
- dns_name: '*.pki.goog.'
+ ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["pkigoog-all"]
+ : behavior: null
+ dns_name: "*.pki.goog."
local_data:
- - local_datas:
- - name: '*.pki.goog.'
- rrdatas:
- - private.googleapis.com.
- ttl: null
- type: CNAME
+ - local_datas:
+ - name: "*.pki.goog."
+ rrdatas:
+ - private.googleapis.com.
+ ttl: null
+ type: CNAME
project: fast2-prod-net-landing-0
response_policy: googleapis
rule_name: pkigoog-all
timeouts: null
- module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["run-all"]:
- behavior: null
- dns_name: '*.run.app.'
+ ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["run-all"]
+ : behavior: null
+ dns_name: "*.run.app."
local_data:
- - local_datas:
- - name: '*.run.app.'
- rrdatas:
- - private.googleapis.com.
- ttl: null
- type: CNAME
+ - local_datas:
+ - name: "*.run.app."
+ rrdatas:
+ - private.googleapis.com.
+ ttl: null
+ type: CNAME
project: fast2-prod-net-landing-0
response_policy: googleapis
rule_name: run-all
timeouts: null
- module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["source"]:
- behavior: null
+ ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["source"]
+ : behavior: null
dns_name: source.developers.google.com.
local_data:
- - local_datas:
- - name: source.developers.google.com.
- rrdatas:
- - private.googleapis.com.
- ttl: null
- type: CNAME
+ - local_datas:
+ - name: source.developers.google.com.
+ rrdatas:
+ - private.googleapis.com.
+ ttl: null
+ type: CNAME
project: fast2-prod-net-landing-0
response_policy: googleapis
rule_name: source
timeouts: null
module.landing-dns-priv-gcp.google_dns_managed_zone.dns_managed_zone[0]:
cloud_logging_config:
- - enable_logging: false
+ - enable_logging: false
description: Terraform managed.
dns_name: gcp.example.com.
dnssec_config: []
@@ -1397,20 +1398,20 @@ values:
service_directory_config: []
timeouts: null
visibility: private
- module.landing-dns-priv-gcp.google_dns_record_set.dns_record_set["A localhost"]:
- managed_zone: gcp-example-com
+ ? module.landing-dns-priv-gcp.google_dns_record_set.dns_record_set["A localhost"]
+ : managed_zone: gcp-example-com
name: localhost.gcp.example.com.
project: fast2-prod-net-landing-0
routing_policy: []
rrdatas:
- - 127.0.0.1
+ - 127.0.0.1
ttl: 300
type: A
- module.landing-firewall.google_compute_firewall.custom-rules["allow-hc-nva-ssh-landing"]:
- allow:
- - ports:
- - '22'
- protocol: tcp
+ ? module.landing-firewall.google_compute_firewall.custom-rules["allow-hc-nva-ssh-landing"]
+ : allow:
+ - ports:
+ - "22"
+ protocol: tcp
deny: []
description: Allow traffic from Google healthchecks to NVA appliances
direction: INGRESS
@@ -1421,20 +1422,20 @@ values:
priority: 1000
project: fast2-prod-net-landing-0
source_ranges:
- - 130.211.0.0/22
- - 209.85.152.0/22
- - 209.85.204.0/22
- - 35.191.0.0/16
+ - 130.211.0.0/22
+ - 209.85.152.0/22
+ - 209.85.204.0/22
+ - 35.191.0.0/16
source_service_accounts: null
source_tags: null
target_service_accounts: null
target_tags: null
timeouts: null
- module.landing-firewall.google_compute_firewall.custom-rules["allow-ncc-nva-bgp-landing"]:
- allow:
- - ports:
- - '179'
- protocol: tcp
+ ? module.landing-firewall.google_compute_firewall.custom-rules["allow-ncc-nva-bgp-landing"]
+ : allow:
+ - ports:
+ - "179"
+ protocol: tcp
deny: []
description: Allow BGP traffic from NCC Cloud Routers to NVAs
direction: INGRESS
@@ -1445,21 +1446,21 @@ values:
priority: 1000
project: fast2-prod-net-landing-0
source_ranges:
- - 10.128.64.201/32
- - 10.128.64.202/32
- - 10.128.96.201/32
- - 10.128.96.202/32
+ - 10.128.64.201/32
+ - 10.128.64.202/32
+ - 10.128.96.201/32
+ - 10.128.96.202/32
source_service_accounts: null
source_tags: null
target_service_accounts: null
target_tags:
- - nva
+ - nva
timeouts: null
- module.landing-firewall.google_compute_firewall.custom-rules["allow-onprem-probes-landing-example"]:
- allow:
- - ports:
- - '12345'
- protocol: tcp
+ ? module.landing-firewall.google_compute_firewall.custom-rules["allow-onprem-probes-landing-example"]
+ : allow:
+ - ports:
+ - "12345"
+ protocol: tcp
deny: []
description: Allow traffic from onprem probes
direction: INGRESS
@@ -1470,28 +1471,28 @@ values:
priority: 1000
project: fast2-prod-net-landing-0
source_ranges:
- - 10.255.255.254/32
+ - 10.255.255.254/32
source_service_accounts: null
source_tags: null
target_service_accounts: null
target_tags: null
timeouts: null
- module.landing-firewall.google_compute_firewall.custom-rules["landing-ingress-default-deny"]:
- allow: []
+ ? module.landing-firewall.google_compute_firewall.custom-rules["landing-ingress-default-deny"]
+ : allow: []
deny:
- - ports: []
- protocol: all
+ - ports: []
+ protocol: all
description: Deny and log any unmatched ingress traffic.
direction: INGRESS
disabled: false
log_config:
- - metadata: EXCLUDE_ALL_METADATA
+ - metadata: EXCLUDE_ALL_METADATA
name: landing-ingress-default-deny
network: prod-landing-0
priority: 65535
project: fast2-prod-net-landing-0
source_ranges:
- - 0.0.0.0/0
+ - 0.0.0.0/0
source_service_accounts: null
source_tags: null
target_service_accounts: null
@@ -1512,8 +1513,8 @@ values:
enable_endpoint_independent_mapping: true
icmp_idle_timeout_sec: 30
log_config:
- - enable: false
- filter: ALL
+ - enable: false
+ filter: ALL
max_ports_per_vm: null
name: ew1
nat_ip_allocate_option: AUTO_ONLY
@@ -1545,8 +1546,8 @@ values:
enable_endpoint_independent_mapping: true
icmp_idle_timeout_sec: 30
log_config:
- - enable: false
- filter: ALL
+ - enable: false
+ filter: ALL
max_ports_per_vm: null
name: ew4
nat_ip_allocate_option: AUTO_ONLY
@@ -1563,8 +1564,8 @@ values:
timeouts: null
type: PUBLIC
udp_idle_timeout_sec: 30
- module.landing-project.google_compute_shared_vpc_host_project.shared_vpc_host[0]:
- project: fast2-prod-net-landing-0
+ ? module.landing-project.google_compute_shared_vpc_host_project.shared_vpc_host[0]
+ : project: fast2-prod-net-landing-0
timeouts: null
module.landing-project.google_project.project[0]:
auto_create_network: false
@@ -1576,70 +1577,70 @@ values:
project_id: fast2-prod-net-landing-0
skip_delete: false
timeouts: null
- module.landing-project.google_project_iam_binding.authoritative["organizations/123456789012/roles/foo"]:
- condition: []
+ ? module.landing-project.google_project_iam_binding.authoritative["organizations/123456789012/roles/foo"]
+ : condition: []
members:
- - serviceAccount:string
+ - serviceAccount:string
project: fast2-prod-net-landing-0
role: organizations/123456789012/roles/foo
- module.landing-project.google_project_iam_binding.authoritative["roles/dns.admin"]:
- condition: []
+ ? module.landing-project.google_project_iam_binding.authoritative["roles/dns.admin"]
+ : condition: []
members:
- - serviceAccount:string
+ - serviceAccount:string
project: fast2-prod-net-landing-0
role: roles/dns.admin
- module.landing-project.google_project_service.project_services["compute.googleapis.com"]:
- disable_dependent_services: false
+ ? module.landing-project.google_project_service.project_services["compute.googleapis.com"]
+ : disable_dependent_services: false
disable_on_destroy: false
project: fast2-prod-net-landing-0
service: compute.googleapis.com
timeouts: null
- module.landing-project.google_project_service.project_services["dns.googleapis.com"]:
- disable_dependent_services: false
+ ? module.landing-project.google_project_service.project_services["dns.googleapis.com"]
+ : disable_dependent_services: false
disable_on_destroy: false
project: fast2-prod-net-landing-0
service: dns.googleapis.com
timeouts: null
- module.landing-project.google_project_service.project_services["iap.googleapis.com"]:
- disable_dependent_services: false
+ ? module.landing-project.google_project_service.project_services["iap.googleapis.com"]
+ : disable_dependent_services: false
disable_on_destroy: false
project: fast2-prod-net-landing-0
service: iap.googleapis.com
timeouts: null
- module.landing-project.google_project_service.project_services["networkconnectivity.googleapis.com"]:
- disable_dependent_services: false
+ ? module.landing-project.google_project_service.project_services["networkconnectivity.googleapis.com"]
+ : disable_dependent_services: false
disable_on_destroy: false
project: fast2-prod-net-landing-0
service: networkconnectivity.googleapis.com
timeouts: null
- module.landing-project.google_project_service.project_services["networkmanagement.googleapis.com"]:
- disable_dependent_services: false
+ ? module.landing-project.google_project_service.project_services["networkmanagement.googleapis.com"]
+ : disable_dependent_services: false
disable_on_destroy: false
project: fast2-prod-net-landing-0
service: networkmanagement.googleapis.com
timeouts: null
- module.landing-project.google_project_service.project_services["stackdriver.googleapis.com"]:
- disable_dependent_services: false
+ ? module.landing-project.google_project_service.project_services["stackdriver.googleapis.com"]
+ : disable_dependent_services: false
disable_on_destroy: false
project: fast2-prod-net-landing-0
service: stackdriver.googleapis.com
timeouts: null
- module.landing-project.google_project_service_identity.jit_si["iap.googleapis.com"]:
- project: fast2-prod-net-landing-0
+ ? module.landing-project.google_project_service_identity.jit_si["iap.googleapis.com"]
+ : project: fast2-prod-net-landing-0
service: iap.googleapis.com
timeouts: null
- module.landing-to-onprem-primary-vpn[0].google_compute_external_vpn_gateway.external_gateway["default"]:
- description: Terraform managed external VPN gateway
+ ? module.landing-to-onprem-primary-vpn[0].google_compute_external_vpn_gateway.external_gateway["default"]
+ : description: Terraform managed external VPN gateway
interface:
- - id: 0
- ip_address: 8.8.8.8
+ - id: 0
+ ip_address: 8.8.8.8
labels: null
name: vpn-to-onprem-ew1-default
project: fast2-prod-net-landing-0
redundancy_type: SINGLE_IP_INTERNALLY_REDUNDANT
timeouts: null
- module.landing-to-onprem-primary-vpn[0].google_compute_ha_vpn_gateway.ha_gateway[0]:
- description: Terraform managed external VPN gateway
+ ? module.landing-to-onprem-primary-vpn[0].google_compute_ha_vpn_gateway.ha_gateway[0]
+ : description: Terraform managed external VPN gateway
name: vpn-to-onprem-ew1
project: fast2-prod-net-landing-0
region: europe-west1
@@ -1647,25 +1648,25 @@ values:
timeouts: null
module.landing-to-onprem-primary-vpn[0].google_compute_router.router[0]:
bgp:
- - advertise_mode: CUSTOM
- advertised_groups: []
- advertised_ip_ranges:
- - description: gcp
- range: 10.1.0.0/16
- - description: gcp-restricted
- range: 199.36.153.4/30
- - description: gcp-dns
- range: 35.199.192.0/19
- asn: 65501
- keepalive_interval: 20
+ - advertise_mode: CUSTOM
+ advertised_groups: []
+ advertised_ip_ranges:
+ - description: gcp
+ range: 10.1.0.0/16
+ - description: gcp-restricted
+ range: 199.36.153.4/30
+ - description: gcp-dns
+ range: 35.199.192.0/19
+ asn: 65501
+ keepalive_interval: 20
description: null
encrypted_interconnect_router: null
name: vpn-vpn-to-onprem-ew1
project: fast2-prod-net-landing-0
region: europe-west1
timeouts: null
- module.landing-to-onprem-primary-vpn[0].google_compute_router_interface.router_interface["0"]:
- interconnect_attachment: null
+ ? module.landing-to-onprem-primary-vpn[0].google_compute_router_interface.router_interface["0"]
+ : interconnect_attachment: null
ip_range: 169.254.1.2/30
name: vpn-to-onprem-ew1-0
private_ip_address: null
@@ -1675,8 +1676,8 @@ values:
subnetwork: null
timeouts: null
vpn_tunnel: vpn-to-onprem-ew1-0
- module.landing-to-onprem-primary-vpn[0].google_compute_router_interface.router_interface["1"]:
- interconnect_attachment: null
+ ? module.landing-to-onprem-primary-vpn[0].google_compute_router_interface.router_interface["1"]
+ : interconnect_attachment: null
ip_range: 169.254.2.2/30
name: vpn-to-onprem-ew1-1
private_ip_address: null
@@ -1686,8 +1687,8 @@ values:
subnetwork: null
timeouts: null
vpn_tunnel: vpn-to-onprem-ew1-1
- module.landing-to-onprem-primary-vpn[0].google_compute_router_peer.bgp_peer["0"]:
- advertise_mode: DEFAULT
+ ? module.landing-to-onprem-primary-vpn[0].google_compute_router_peer.bgp_peer["0"]
+ : advertise_mode: DEFAULT
advertised_groups: []
advertised_ip_ranges: []
advertised_route_priority: 1000
@@ -1703,8 +1704,8 @@ values:
router: vpn-vpn-to-onprem-ew1
router_appliance_instance: null
timeouts: null
- module.landing-to-onprem-primary-vpn[0].google_compute_router_peer.bgp_peer["1"]:
- advertise_mode: DEFAULT
+ ? module.landing-to-onprem-primary-vpn[0].google_compute_router_peer.bgp_peer["1"]
+ : advertise_mode: DEFAULT
advertised_groups: []
advertised_ip_ranges: []
advertised_route_priority: 1000
@@ -1720,8 +1721,8 @@ values:
router: vpn-vpn-to-onprem-ew1
router_appliance_instance: null
timeouts: null
- module.landing-to-onprem-primary-vpn[0].google_compute_vpn_tunnel.tunnels["0"]:
- description: null
+ ? module.landing-to-onprem-primary-vpn[0].google_compute_vpn_tunnel.tunnels["0"]
+ : description: null
ike_version: 2
labels: null
name: vpn-to-onprem-ew1-0
@@ -1734,8 +1735,8 @@ values:
target_vpn_gateway: null
timeouts: null
vpn_gateway_interface: 0
- module.landing-to-onprem-primary-vpn[0].google_compute_vpn_tunnel.tunnels["1"]:
- description: null
+ ? module.landing-to-onprem-primary-vpn[0].google_compute_vpn_tunnel.tunnels["1"]
+ : description: null
ike_version: 2
labels: null
name: vpn-to-onprem-ew1-1
@@ -1752,18 +1753,18 @@ values:
byte_length: 8
keepers: null
prefix: null
- module.landing-to-onprem-secondary-vpn[0].google_compute_external_vpn_gateway.external_gateway["default"]:
- description: Terraform managed external VPN gateway
+ ? module.landing-to-onprem-secondary-vpn[0].google_compute_external_vpn_gateway.external_gateway["default"]
+ : description: Terraform managed external VPN gateway
interface:
- - id: 0
- ip_address: 8.8.4.4
+ - id: 0
+ ip_address: 8.8.4.4
labels: null
name: vpn-to-onprem-ew4-default
project: fast2-prod-net-landing-0
redundancy_type: SINGLE_IP_INTERNALLY_REDUNDANT
timeouts: null
- module.landing-to-onprem-secondary-vpn[0].google_compute_ha_vpn_gateway.ha_gateway[0]:
- description: Terraform managed external VPN gateway
+ ? module.landing-to-onprem-secondary-vpn[0].google_compute_ha_vpn_gateway.ha_gateway[0]
+ : description: Terraform managed external VPN gateway
name: vpn-to-onprem-ew4
project: fast2-prod-net-landing-0
region: europe-west4
@@ -1771,25 +1772,25 @@ values:
timeouts: null
module.landing-to-onprem-secondary-vpn[0].google_compute_router.router[0]:
bgp:
- - advertise_mode: CUSTOM
- advertised_groups: []
- advertised_ip_ranges:
- - description: gcp
- range: 10.1.0.0/16
- - description: gcp-restricted
- range: 199.36.153.4/30
- - description: gcp-dns
- range: 35.199.192.0/19
- asn: 65501
- keepalive_interval: 20
+ - advertise_mode: CUSTOM
+ advertised_groups: []
+ advertised_ip_ranges:
+ - description: gcp
+ range: 10.1.0.0/16
+ - description: gcp-restricted
+ range: 199.36.153.4/30
+ - description: gcp-dns
+ range: 35.199.192.0/19
+ asn: 65501
+ keepalive_interval: 20
description: null
encrypted_interconnect_router: null
name: vpn-vpn-to-onprem-ew4
project: fast2-prod-net-landing-0
region: europe-west4
timeouts: null
- module.landing-to-onprem-secondary-vpn[0].google_compute_router_interface.router_interface["0"]:
- interconnect_attachment: null
+ ? module.landing-to-onprem-secondary-vpn[0].google_compute_router_interface.router_interface["0"]
+ : interconnect_attachment: null
ip_range: 169.254.3.2/30
name: vpn-to-onprem-ew4-0
private_ip_address: null
@@ -1799,8 +1800,8 @@ values:
subnetwork: null
timeouts: null
vpn_tunnel: vpn-to-onprem-ew4-0
- module.landing-to-onprem-secondary-vpn[0].google_compute_router_interface.router_interface["1"]:
- interconnect_attachment: null
+ ? module.landing-to-onprem-secondary-vpn[0].google_compute_router_interface.router_interface["1"]
+ : interconnect_attachment: null
ip_range: 169.254.4.2/30
name: vpn-to-onprem-ew4-1
private_ip_address: null
@@ -1810,8 +1811,8 @@ values:
subnetwork: null
timeouts: null
vpn_tunnel: vpn-to-onprem-ew4-1
- module.landing-to-onprem-secondary-vpn[0].google_compute_router_peer.bgp_peer["0"]:
- advertise_mode: DEFAULT
+ ? module.landing-to-onprem-secondary-vpn[0].google_compute_router_peer.bgp_peer["0"]
+ : advertise_mode: DEFAULT
advertised_groups: []
advertised_ip_ranges: []
advertised_route_priority: 1000
@@ -1827,8 +1828,8 @@ values:
router: vpn-vpn-to-onprem-ew4
router_appliance_instance: null
timeouts: null
- module.landing-to-onprem-secondary-vpn[0].google_compute_router_peer.bgp_peer["1"]:
- advertise_mode: DEFAULT
+ ? module.landing-to-onprem-secondary-vpn[0].google_compute_router_peer.bgp_peer["1"]
+ : advertise_mode: DEFAULT
advertised_groups: []
advertised_ip_ranges: []
advertised_route_priority: 1000
@@ -1844,8 +1845,8 @@ values:
router: vpn-vpn-to-onprem-ew4
router_appliance_instance: null
timeouts: null
- module.landing-to-onprem-secondary-vpn[0].google_compute_vpn_tunnel.tunnels["0"]:
- description: null
+ ? module.landing-to-onprem-secondary-vpn[0].google_compute_vpn_tunnel.tunnels["0"]
+ : description: null
ike_version: 2
labels: null
name: vpn-to-onprem-ew4-0
@@ -1858,8 +1859,8 @@ values:
target_vpn_gateway: null
timeouts: null
vpn_gateway_interface: 0
- module.landing-to-onprem-secondary-vpn[0].google_compute_vpn_tunnel.tunnels["1"]:
- description: null
+ ? module.landing-to-onprem-secondary-vpn[0].google_compute_vpn_tunnel.tunnels["1"]
+ : description: null
ike_version: 2
labels: null
name: vpn-to-onprem-ew4-1
@@ -1913,8 +1914,8 @@ values:
project: fast2-prod-net-landing-0
tags: null
timeouts: null
- module.landing-vpc.google_compute_subnetwork.subnetwork["europe-west1/landing-default"]:
- description: Default europe-west1 subnet for landing
+ ? module.landing-vpc.google_compute_subnetwork.subnetwork["europe-west1/landing-default"]
+ : description: Default europe-west1 subnet for landing
ip_cidr_range: 10.64.0.0/24
ipv6_access_type: null
log_config: []
@@ -1924,10 +1925,9 @@ values:
project: fast2-prod-net-landing-0
region: europe-west1
role: null
- secondary_ip_range: []
timeouts: null
- module.landing-vpc.google_compute_subnetwork.subnetwork["europe-west4/landing-default"]:
- description: Default europe-west4 subnet for landing
+ ? module.landing-vpc.google_compute_subnetwork.subnetwork["europe-west4/landing-default"]
+ : description: Default europe-west4 subnet for landing
ip_cidr_range: 10.80.0.0/24
ipv6_access_type: null
log_config: []
@@ -1937,7 +1937,6 @@ values:
project: fast2-prod-net-landing-0
region: europe-west4
role: null
- secondary_ip_range: []
timeouts: null
module.landing-vpc.google_dns_policy.default[0]:
alternative_name_server_config: []
@@ -1946,7 +1945,7 @@ values:
enable_logging: null
name: prod-landing-0
networks:
- - {}
+ - {}
project: fast2-prod-net-landing-0
timeouts: null
module.nva["primary-b"].google_compute_instance.default[0]:
@@ -1954,15 +1953,15 @@ values:
allow_stopping_for_update: true
attached_disk: []
boot_disk:
- - auto_delete: true
- disk_encryption_key_raw: null
- initialize_params:
- - enable_confidential_compute: null
- image: projects/cos-cloud/global/images/family/cos-stable
- resource_manager_tags: null
- size: 10
- type: pd-balanced
- mode: READ_WRITE
+ - auto_delete: true
+ disk_encryption_key_raw: null
+ initialize_params:
+ - enable_confidential_compute: null
+ image: projects/cos-cloud/global/images/family/cos-stable
+ resource_manager_tags: null
+ size: 10
+ type: pd-balanced
+ mode: READ_WRITE
can_ip_forward: true
deletion_protection: false
description: Managed by the compute-vm Terraform module.
@@ -1972,7 +1971,8 @@ values:
labels: null
machine_type: e2-standard-2
metadata:
- user-data: "#cloud-config\n\n# Copyright 2024 Google LLC\n#\n# Licensed under\
+ user-data:
+ "#cloud-config\n\n# Copyright 2024 Google LLC\n#\n# Licensed under\
\ the Apache License, Version 2.0 (the \"License\");\n# you may not use this\
\ file except in compliance with the License.\n# You may obtain a copy of\
\ the License at\n#\n# https://www.apache.org/licenses/LICENSE-2.0\n#\n\
@@ -2159,44 +2159,44 @@ values:
metadata_startup_script: null
name: nva-ew1-b
network_interface:
- - access_config: []
- alias_ip_range: []
- ipv6_access_config: []
- network_ip: 10.64.128.101
- nic_type: null
- queue_count: null
- security_policy: null
- - access_config: []
- alias_ip_range: []
- ipv6_access_config: []
- network_ip: 10.64.0.101
- nic_type: null
- queue_count: null
- security_policy: null
+ - access_config: []
+ alias_ip_range: []
+ ipv6_access_config: []
+ network_ip: 10.64.128.101
+ nic_type: null
+ queue_count: null
+ security_policy: null
+ - access_config: []
+ alias_ip_range: []
+ ipv6_access_config: []
+ network_ip: 10.64.0.101
+ nic_type: null
+ queue_count: null
+ security_policy: null
network_performance_config: []
params: []
project: fast2-prod-net-landing-0
resource_policies: null
scheduling:
- - automatic_restart: true
- instance_termination_action: null
- local_ssd_recovery_timeout: []
- maintenance_interval: null
- max_run_duration: []
- min_node_cpus: null
- node_affinities: []
- on_host_maintenance: MIGRATE
- preemptible: false
- provisioning_model: STANDARD
+ - automatic_restart: true
+ instance_termination_action: null
+ local_ssd_recovery_timeout: []
+ maintenance_interval: null
+ max_run_duration: []
+ min_node_cpus: null
+ node_affinities: []
+ on_host_maintenance: MIGRATE
+ preemptible: false
+ provisioning_model: STANDARD
scratch_disk: []
service_account:
- - scopes:
- - https://www.googleapis.com/auth/devstorage.read_only
- - https://www.googleapis.com/auth/logging.write
- - https://www.googleapis.com/auth/monitoring.write
+ - scopes:
+ - https://www.googleapis.com/auth/devstorage.read_only
+ - https://www.googleapis.com/auth/logging.write
+ - https://www.googleapis.com/auth/monitoring.write
shielded_instance_config: []
tags:
- - nva
+ - nva
timeouts: null
zone: europe-west1-b
module.nva["primary-c"].google_compute_instance.default[0]:
@@ -2204,15 +2204,15 @@ values:
allow_stopping_for_update: true
attached_disk: []
boot_disk:
- - auto_delete: true
- disk_encryption_key_raw: null
- initialize_params:
- - enable_confidential_compute: null
- image: projects/cos-cloud/global/images/family/cos-stable
- resource_manager_tags: null
- size: 10
- type: pd-balanced
- mode: READ_WRITE
+ - auto_delete: true
+ disk_encryption_key_raw: null
+ initialize_params:
+ - enable_confidential_compute: null
+ image: projects/cos-cloud/global/images/family/cos-stable
+ resource_manager_tags: null
+ size: 10
+ type: pd-balanced
+ mode: READ_WRITE
can_ip_forward: true
deletion_protection: false
description: Managed by the compute-vm Terraform module.
@@ -2222,7 +2222,8 @@ values:
labels: null
machine_type: e2-standard-2
metadata:
- user-data: "#cloud-config\n\n# Copyright 2024 Google LLC\n#\n# Licensed under\
+ user-data:
+ "#cloud-config\n\n# Copyright 2024 Google LLC\n#\n# Licensed under\
\ the Apache License, Version 2.0 (the \"License\");\n# you may not use this\
\ file except in compliance with the License.\n# You may obtain a copy of\
\ the License at\n#\n# https://www.apache.org/licenses/LICENSE-2.0\n#\n\
@@ -2409,44 +2410,44 @@ values:
metadata_startup_script: null
name: nva-ew1-c
network_interface:
- - access_config: []
- alias_ip_range: []
- ipv6_access_config: []
- network_ip: 10.64.128.102
- nic_type: null
- queue_count: null
- security_policy: null
- - access_config: []
- alias_ip_range: []
- ipv6_access_config: []
- network_ip: 10.64.0.102
- nic_type: null
- queue_count: null
- security_policy: null
+ - access_config: []
+ alias_ip_range: []
+ ipv6_access_config: []
+ network_ip: 10.64.128.102
+ nic_type: null
+ queue_count: null
+ security_policy: null
+ - access_config: []
+ alias_ip_range: []
+ ipv6_access_config: []
+ network_ip: 10.64.0.102
+ nic_type: null
+ queue_count: null
+ security_policy: null
network_performance_config: []
params: []
project: fast2-prod-net-landing-0
resource_policies: null
scheduling:
- - automatic_restart: true
- instance_termination_action: null
- local_ssd_recovery_timeout: []
- maintenance_interval: null
- max_run_duration: []
- min_node_cpus: null
- node_affinities: []
- on_host_maintenance: MIGRATE
- preemptible: false
- provisioning_model: STANDARD
+ - automatic_restart: true
+ instance_termination_action: null
+ local_ssd_recovery_timeout: []
+ maintenance_interval: null
+ max_run_duration: []
+ min_node_cpus: null
+ node_affinities: []
+ on_host_maintenance: MIGRATE
+ preemptible: false
+ provisioning_model: STANDARD
scratch_disk: []
service_account:
- - scopes:
- - https://www.googleapis.com/auth/devstorage.read_only
- - https://www.googleapis.com/auth/logging.write
- - https://www.googleapis.com/auth/monitoring.write
+ - scopes:
+ - https://www.googleapis.com/auth/devstorage.read_only
+ - https://www.googleapis.com/auth/logging.write
+ - https://www.googleapis.com/auth/monitoring.write
shielded_instance_config: []
tags:
- - nva
+ - nva
timeouts: null
zone: europe-west1-c
module.nva["secondary-b"].google_compute_instance.default[0]:
@@ -2454,15 +2455,15 @@ values:
allow_stopping_for_update: true
attached_disk: []
boot_disk:
- - auto_delete: true
- disk_encryption_key_raw: null
- initialize_params:
- - enable_confidential_compute: null
- image: projects/cos-cloud/global/images/family/cos-stable
- resource_manager_tags: null
- size: 10
- type: pd-balanced
- mode: READ_WRITE
+ - auto_delete: true
+ disk_encryption_key_raw: null
+ initialize_params:
+ - enable_confidential_compute: null
+ image: projects/cos-cloud/global/images/family/cos-stable
+ resource_manager_tags: null
+ size: 10
+ type: pd-balanced
+ mode: READ_WRITE
can_ip_forward: true
deletion_protection: false
description: Managed by the compute-vm Terraform module.
@@ -2472,7 +2473,8 @@ values:
labels: null
machine_type: e2-standard-2
metadata:
- user-data: "#cloud-config\n\n# Copyright 2024 Google LLC\n#\n# Licensed under\
+ user-data:
+ "#cloud-config\n\n# Copyright 2024 Google LLC\n#\n# Licensed under\
\ the Apache License, Version 2.0 (the \"License\");\n# you may not use this\
\ file except in compliance with the License.\n# You may obtain a copy of\
\ the License at\n#\n# https://www.apache.org/licenses/LICENSE-2.0\n#\n\
@@ -2659,44 +2661,44 @@ values:
metadata_startup_script: null
name: nva-ew4-b
network_interface:
- - access_config: []
- alias_ip_range: []
- ipv6_access_config: []
- network_ip: 10.80.128.101
- nic_type: null
- queue_count: null
- security_policy: null
- - access_config: []
- alias_ip_range: []
- ipv6_access_config: []
- network_ip: 10.80.0.101
- nic_type: null
- queue_count: null
- security_policy: null
+ - access_config: []
+ alias_ip_range: []
+ ipv6_access_config: []
+ network_ip: 10.80.128.101
+ nic_type: null
+ queue_count: null
+ security_policy: null
+ - access_config: []
+ alias_ip_range: []
+ ipv6_access_config: []
+ network_ip: 10.80.0.101
+ nic_type: null
+ queue_count: null
+ security_policy: null
network_performance_config: []
params: []
project: fast2-prod-net-landing-0
resource_policies: null
scheduling:
- - automatic_restart: true
- instance_termination_action: null
- local_ssd_recovery_timeout: []
- maintenance_interval: null
- max_run_duration: []
- min_node_cpus: null
- node_affinities: []
- on_host_maintenance: MIGRATE
- preemptible: false
- provisioning_model: STANDARD
+ - automatic_restart: true
+ instance_termination_action: null
+ local_ssd_recovery_timeout: []
+ maintenance_interval: null
+ max_run_duration: []
+ min_node_cpus: null
+ node_affinities: []
+ on_host_maintenance: MIGRATE
+ preemptible: false
+ provisioning_model: STANDARD
scratch_disk: []
service_account:
- - scopes:
- - https://www.googleapis.com/auth/devstorage.read_only
- - https://www.googleapis.com/auth/logging.write
- - https://www.googleapis.com/auth/monitoring.write
+ - scopes:
+ - https://www.googleapis.com/auth/devstorage.read_only
+ - https://www.googleapis.com/auth/logging.write
+ - https://www.googleapis.com/auth/monitoring.write
shielded_instance_config: []
tags:
- - nva
+ - nva
timeouts: null
zone: europe-west4-b
module.nva["secondary-c"].google_compute_instance.default[0]:
@@ -2704,15 +2706,15 @@ values:
allow_stopping_for_update: true
attached_disk: []
boot_disk:
- - auto_delete: true
- disk_encryption_key_raw: null
- initialize_params:
- - enable_confidential_compute: null
- image: projects/cos-cloud/global/images/family/cos-stable
- resource_manager_tags: null
- size: 10
- type: pd-balanced
- mode: READ_WRITE
+ - auto_delete: true
+ disk_encryption_key_raw: null
+ initialize_params:
+ - enable_confidential_compute: null
+ image: projects/cos-cloud/global/images/family/cos-stable
+ resource_manager_tags: null
+ size: 10
+ type: pd-balanced
+ mode: READ_WRITE
can_ip_forward: true
deletion_protection: false
description: Managed by the compute-vm Terraform module.
@@ -2722,7 +2724,8 @@ values:
labels: null
machine_type: e2-standard-2
metadata:
- user-data: "#cloud-config\n\n# Copyright 2024 Google LLC\n#\n# Licensed under\
+ user-data:
+ "#cloud-config\n\n# Copyright 2024 Google LLC\n#\n# Licensed under\
\ the Apache License, Version 2.0 (the \"License\");\n# you may not use this\
\ file except in compliance with the License.\n# You may obtain a copy of\
\ the License at\n#\n# https://www.apache.org/licenses/LICENSE-2.0\n#\n\
@@ -2909,44 +2912,44 @@ values:
metadata_startup_script: null
name: nva-ew4-c
network_interface:
- - access_config: []
- alias_ip_range: []
- ipv6_access_config: []
- network_ip: 10.80.128.102
- nic_type: null
- queue_count: null
- security_policy: null
- - access_config: []
- alias_ip_range: []
- ipv6_access_config: []
- network_ip: 10.80.0.102
- nic_type: null
- queue_count: null
- security_policy: null
+ - access_config: []
+ alias_ip_range: []
+ ipv6_access_config: []
+ network_ip: 10.80.128.102
+ nic_type: null
+ queue_count: null
+ security_policy: null
+ - access_config: []
+ alias_ip_range: []
+ ipv6_access_config: []
+ network_ip: 10.80.0.102
+ nic_type: null
+ queue_count: null
+ security_policy: null
network_performance_config: []
params: []
project: fast2-prod-net-landing-0
resource_policies: null
scheduling:
- - automatic_restart: true
- instance_termination_action: null
- local_ssd_recovery_timeout: []
- maintenance_interval: null
- max_run_duration: []
- min_node_cpus: null
- node_affinities: []
- on_host_maintenance: MIGRATE
- preemptible: false
- provisioning_model: STANDARD
+ - automatic_restart: true
+ instance_termination_action: null
+ local_ssd_recovery_timeout: []
+ maintenance_interval: null
+ max_run_duration: []
+ min_node_cpus: null
+ node_affinities: []
+ on_host_maintenance: MIGRATE
+ preemptible: false
+ provisioning_model: STANDARD
scratch_disk: []
service_account:
- - scopes:
- - https://www.googleapis.com/auth/devstorage.read_only
- - https://www.googleapis.com/auth/logging.write
- - https://www.googleapis.com/auth/monitoring.write
+ - scopes:
+ - https://www.googleapis.com/auth/devstorage.read_only
+ - https://www.googleapis.com/auth/logging.write
+ - https://www.googleapis.com/auth/monitoring.write
shielded_instance_config: []
tags:
- - nva
+ - nva
timeouts: null
zone: europe-west4-c
module.peering-dev.google_compute_network_peering.local_network_peering:
@@ -2977,9 +2980,9 @@ values:
import_subnet_routes_with_public_ip: null
stack_type: IPV4_ONLY
timeouts: null
- module.prod-dns-peer-landing-rev-10.google_dns_managed_zone.dns_managed_zone[0]:
- cloud_logging_config:
- - enable_logging: false
+ ? module.prod-dns-peer-landing-rev-10.google_dns_managed_zone.dns_managed_zone[0]
+ : cloud_logging_config:
+ - enable_logging: false
description: Terraform managed.
dns_name: 10.in-addr.arpa.
dnssec_config: []
@@ -2994,7 +2997,7 @@ values:
visibility: private
module.prod-dns-peer-landing-root.google_dns_managed_zone.dns_managed_zone[0]:
cloud_logging_config:
- - enable_logging: false
+ - enable_logging: false
description: Terraform managed.
dns_name: .
dnssec_config: []
@@ -3009,7 +3012,7 @@ values:
visibility: private
module.prod-dns-private-zone.google_dns_managed_zone.dns_managed_zone[0]:
cloud_logging_config:
- - enable_logging: false
+ - enable_logging: false
description: Terraform managed.
dns_name: prod.gcp.example.com.
dnssec_config: []
@@ -3022,41 +3025,41 @@ values:
service_directory_config: []
timeouts: null
visibility: private
- module.prod-dns-private-zone.google_dns_record_set.dns_record_set["A localhost"]:
- managed_zone: prod-gcp-example-com
+ ? module.prod-dns-private-zone.google_dns_record_set.dns_record_set["A localhost"]
+ : managed_zone: prod-gcp-example-com
name: localhost.prod.gcp.example.com.
project: fast2-prod-net-spoke-0
routing_policy: []
rrdatas:
- - 127.0.0.1
+ - 127.0.0.1
ttl: 300
type: A
- module.prod-spoke-firewall.google_compute_firewall.custom-rules["ingress-default-deny"]:
- allow: []
+ ? module.prod-spoke-firewall.google_compute_firewall.custom-rules["ingress-default-deny"]
+ : allow: []
deny:
- - ports: []
- protocol: all
+ - ports: []
+ protocol: all
description: Deny and log any unmatched ingress traffic.
direction: INGRESS
disabled: false
log_config:
- - metadata: EXCLUDE_ALL_METADATA
+ - metadata: EXCLUDE_ALL_METADATA
name: ingress-default-deny
network: prod-spoke-0
priority: 65535
project: fast2-prod-net-spoke-0
source_ranges:
- - 0.0.0.0/0
+ - 0.0.0.0/0
source_service_accounts: null
source_tags: null
target_service_accounts: null
target_tags: null
timeouts: null
- module.prod-spoke-project.google_compute_shared_vpc_host_project.shared_vpc_host[0]:
- project: fast2-prod-net-spoke-0
+ ? module.prod-spoke-project.google_compute_shared_vpc_host_project.shared_vpc_host[0]
+ : project: fast2-prod-net-spoke-0
timeouts: null
- module.prod-spoke-project.google_monitoring_monitored_project.primary["fast2-prod-net-landing-0"]:
- metrics_scope: fast2-prod-net-landing-0
+ ? module.prod-spoke-project.google_monitoring_monitored_project.primary["fast2-prod-net-landing-0"]
+ : metrics_scope: fast2-prod-net-landing-0
name: fast2-prod-net-spoke-0
timeouts: null
module.prod-spoke-project.google_project.project[0]:
@@ -3069,73 +3072,73 @@ values:
project_id: fast2-prod-net-spoke-0
skip_delete: false
timeouts: null
- module.prod-spoke-project.google_project_iam_binding.authoritative["roles/dns.admin"]:
- condition: []
+ ? module.prod-spoke-project.google_project_iam_binding.authoritative["roles/dns.admin"]
+ : condition: []
members:
- - serviceAccount:string
+ - serviceAccount:string
project: fast2-prod-net-spoke-0
role: roles/dns.admin
- module.prod-spoke-project.google_project_iam_binding.bindings["sa_delegated_grants"]:
- condition:
- - description: Production host project delegated grants.
- expression: api.getAttribute('iam.googleapis.com/modifiedGrantsByRole', []).hasOnly(['roles/composer.sharedVpcAgent','roles/compute.networkUser','roles/compute.networkViewer','roles/container.hostServiceAgentUser','roles/multiclusterservicediscovery.serviceAgent','roles/vpcaccess.user'])
- title: prod_stage3_sa_delegated_grants
+ ? module.prod-spoke-project.google_project_iam_binding.bindings["sa_delegated_grants"]
+ : condition:
+ - description: Production host project delegated grants.
+ expression: api.getAttribute('iam.googleapis.com/modifiedGrantsByRole', []).hasOnly(['roles/composer.sharedVpcAgent','roles/compute.networkUser','roles/compute.networkViewer','roles/container.hostServiceAgentUser','roles/multiclusterservicediscovery.serviceAgent','roles/vpcaccess.user'])
+ title: prod_stage3_sa_delegated_grants
members:
- - serviceAccount:string
+ - serviceAccount:string
project: fast2-prod-net-spoke-0
role: roles/resourcemanager.projectIamAdmin
module.prod-spoke-project.google_project_iam_member.servicenetworking[0]:
condition: []
project: fast2-prod-net-spoke-0
role: roles/servicenetworking.serviceAgent
- module.prod-spoke-project.google_project_service.project_services["compute.googleapis.com"]:
- disable_dependent_services: false
+ ? module.prod-spoke-project.google_project_service.project_services["compute.googleapis.com"]
+ : disable_dependent_services: false
disable_on_destroy: false
project: fast2-prod-net-spoke-0
service: compute.googleapis.com
timeouts: null
- module.prod-spoke-project.google_project_service.project_services["dns.googleapis.com"]:
- disable_dependent_services: false
+ ? module.prod-spoke-project.google_project_service.project_services["dns.googleapis.com"]
+ : disable_dependent_services: false
disable_on_destroy: false
project: fast2-prod-net-spoke-0
service: dns.googleapis.com
timeouts: null
- module.prod-spoke-project.google_project_service.project_services["iap.googleapis.com"]:
- disable_dependent_services: false
+ ? module.prod-spoke-project.google_project_service.project_services["iap.googleapis.com"]
+ : disable_dependent_services: false
disable_on_destroy: false
project: fast2-prod-net-spoke-0
service: iap.googleapis.com
timeouts: null
- module.prod-spoke-project.google_project_service.project_services["networkmanagement.googleapis.com"]:
- disable_dependent_services: false
+ ? module.prod-spoke-project.google_project_service.project_services["networkmanagement.googleapis.com"]
+ : disable_dependent_services: false
disable_on_destroy: false
project: fast2-prod-net-spoke-0
service: networkmanagement.googleapis.com
timeouts: null
- module.prod-spoke-project.google_project_service.project_services["servicenetworking.googleapis.com"]:
- disable_dependent_services: false
+ ? module.prod-spoke-project.google_project_service.project_services["servicenetworking.googleapis.com"]
+ : disable_dependent_services: false
disable_on_destroy: false
project: fast2-prod-net-spoke-0
service: servicenetworking.googleapis.com
timeouts: null
- module.prod-spoke-project.google_project_service.project_services["stackdriver.googleapis.com"]:
- disable_dependent_services: false
+ ? module.prod-spoke-project.google_project_service.project_services["stackdriver.googleapis.com"]
+ : disable_dependent_services: false
disable_on_destroy: false
project: fast2-prod-net-spoke-0
service: stackdriver.googleapis.com
timeouts: null
- module.prod-spoke-project.google_project_service.project_services["vpcaccess.googleapis.com"]:
- disable_dependent_services: false
+ ? module.prod-spoke-project.google_project_service.project_services["vpcaccess.googleapis.com"]
+ : disable_dependent_services: false
disable_on_destroy: false
project: fast2-prod-net-spoke-0
service: vpcaccess.googleapis.com
timeouts: null
- module.prod-spoke-project.google_project_service_identity.jit_si["iap.googleapis.com"]:
- project: fast2-prod-net-spoke-0
+ ? module.prod-spoke-project.google_project_service_identity.jit_si["iap.googleapis.com"]
+ : project: fast2-prod-net-spoke-0
service: iap.googleapis.com
timeouts: null
- module.prod-spoke-project.google_project_service_identity.servicenetworking[0]:
- project: fast2-prod-net-spoke-0
+ ? module.prod-spoke-project.google_project_service_identity.servicenetworking[0]
+ : project: fast2-prod-net-spoke-0
service: servicenetworking.googleapis.com
timeouts: null
module.prod-spoke-vpc.google_compute_network.network[0]:
@@ -3175,8 +3178,8 @@ values:
project: fast2-prod-net-spoke-0
tags: null
timeouts: null
- module.prod-spoke-vpc.google_compute_subnetwork.subnetwork["europe-west1/prod-default"]:
- description: Default europe-west1 subnet for prod
+ ? module.prod-spoke-vpc.google_compute_subnetwork.subnetwork["europe-west1/prod-default"]
+ : description: Default europe-west1 subnet for prod
ip_cidr_range: 10.72.0.0/24
ipv6_access_type: null
log_config: []
@@ -3186,10 +3189,9 @@ values:
project: fast2-prod-net-spoke-0
region: europe-west1
role: null
- secondary_ip_range: []
timeouts: null
- module.prod-spoke-vpc.google_compute_subnetwork.subnetwork["europe-west4/prod-default"]:
- description: Default europe-west4 subnet for prod
+ ? module.prod-spoke-vpc.google_compute_subnetwork.subnetwork["europe-west4/prod-default"]
+ : description: Default europe-west4 subnet for prod
ip_cidr_range: 10.88.0.0/24
ipv6_access_type: null
log_config: []
@@ -3199,7 +3201,6 @@ values:
project: fast2-prod-net-spoke-0
region: europe-west4
role: null
- secondary_ip_range: []
timeouts: null
module.prod-spoke-vpc.google_dns_policy.default[0]:
alternative_name_server_config: []
@@ -3208,18 +3209,18 @@ values:
enable_logging: true
name: prod-spoke-0
networks:
- - {}
+ - {}
project: fast2-prod-net-spoke-0
timeouts: null
module.spokes-dmz["primary"].google_compute_router.cr:
bgp:
- - advertise_mode: CUSTOM
- advertised_groups: []
- advertised_ip_ranges:
- - description: Default route.
- range: 0.0.0.0/0
- asn: 64512
- keepalive_interval: 20
+ - advertise_mode: CUSTOM
+ advertised_groups: []
+ advertised_ip_ranges:
+ - description: Default route.
+ range: 0.0.0.0/0
+ asn: 64512
+ keepalive_interval: 20
description: null
encrypted_interconnect_router: null
name: prod-spoke-dmz-ew1-cr
@@ -3306,10 +3307,10 @@ values:
labels: null
linked_interconnect_attachments: []
linked_router_appliance_instances:
- - instances:
- - {}
- - {}
- site_to_site_data_transfer: false
+ - instances:
+ - {}
+ - {}
+ site_to_site_data_transfer: false
linked_vpc_network: []
linked_vpn_tunnels: []
location: europe-west1
@@ -3318,13 +3319,13 @@ values:
timeouts: null
module.spokes-dmz["secondary"].google_compute_router.cr:
bgp:
- - advertise_mode: CUSTOM
- advertised_groups: []
- advertised_ip_ranges:
- - description: Default route.
- range: 0.0.0.0/0
- asn: 64512
- keepalive_interval: 20
+ - advertise_mode: CUSTOM
+ advertised_groups: []
+ advertised_ip_ranges:
+ - description: Default route.
+ range: 0.0.0.0/0
+ asn: 64512
+ keepalive_interval: 20
description: null
encrypted_interconnect_router: null
name: prod-spoke-dmz-ew4-cr
@@ -3411,10 +3412,10 @@ values:
labels: null
linked_interconnect_attachments: []
linked_router_appliance_instances:
- - instances:
- - {}
- - {}
- site_to_site_data_transfer: false
+ - instances:
+ - {}
+ - {}
+ site_to_site_data_transfer: false
linked_vpc_network: []
linked_vpn_tunnels: []
location: europe-west4
@@ -3423,23 +3424,23 @@ values:
timeouts: null
module.spokes-landing["primary"].google_compute_router.cr:
bgp:
- - advertise_mode: CUSTOM
- advertised_groups: []
- advertised_ip_ranges:
- - description: GCP landing primary.
- range: 10.64.0.0/17
- - description: GCP dev primary.
- range: 10.68.0.0/16
- - description: GCP prod primary.
- range: 10.72.0.0/16
- - description: GCP landing secondary.
- range: 10.80.0.0/17
- - description: GCP dev secondary.
- range: 10.84.0.0/16
- - description: GCP prod secondary.
- range: 10.88.0.0/16
- asn: 64515
- keepalive_interval: 20
+ - advertise_mode: CUSTOM
+ advertised_groups: []
+ advertised_ip_ranges:
+ - description: GCP landing primary.
+ range: 10.64.0.0/17
+ - description: GCP dev primary.
+ range: 10.68.0.0/16
+ - description: GCP prod primary.
+ range: 10.72.0.0/16
+ - description: GCP landing secondary.
+ range: 10.80.0.0/17
+ - description: GCP dev secondary.
+ range: 10.84.0.0/16
+ - description: GCP prod secondary.
+ range: 10.88.0.0/16
+ asn: 64515
+ keepalive_interval: 20
description: null
encrypted_interconnect_router: null
name: prod-spoke-landing-ew1-cr
@@ -3526,10 +3527,10 @@ values:
labels: null
linked_interconnect_attachments: []
linked_router_appliance_instances:
- - instances:
- - {}
- - {}
- site_to_site_data_transfer: false
+ - instances:
+ - {}
+ - {}
+ site_to_site_data_transfer: false
linked_vpc_network: []
linked_vpn_tunnels: []
location: europe-west1
@@ -3538,23 +3539,23 @@ values:
timeouts: null
module.spokes-landing["secondary"].google_compute_router.cr:
bgp:
- - advertise_mode: CUSTOM
- advertised_groups: []
- advertised_ip_ranges:
- - description: GCP landing primary.
- range: 10.64.0.0/17
- - description: GCP dev primary.
- range: 10.68.0.0/16
- - description: GCP prod primary.
- range: 10.72.0.0/16
- - description: GCP landing secondary.
- range: 10.80.0.0/17
- - description: GCP dev secondary.
- range: 10.84.0.0/16
- - description: GCP prod secondary.
- range: 10.88.0.0/16
- asn: 64515
- keepalive_interval: 20
+ - advertise_mode: CUSTOM
+ advertised_groups: []
+ advertised_ip_ranges:
+ - description: GCP landing primary.
+ range: 10.64.0.0/17
+ - description: GCP dev primary.
+ range: 10.68.0.0/16
+ - description: GCP prod primary.
+ range: 10.72.0.0/16
+ - description: GCP landing secondary.
+ range: 10.80.0.0/17
+ - description: GCP dev secondary.
+ range: 10.84.0.0/16
+ - description: GCP prod secondary.
+ range: 10.88.0.0/16
+ asn: 64515
+ keepalive_interval: 20
description: null
encrypted_interconnect_router: null
name: prod-spoke-landing-ew4-cr
@@ -3641,10 +3642,10 @@ values:
labels: null
linked_interconnect_attachments: []
linked_router_appliance_instances:
- - instances:
- - {}
- - {}
- site_to_site_data_transfer: false
+ - instances:
+ - {}
+ - {}
+ site_to_site_data_transfer: false
linked_vpc_network: []
linked_vpn_tunnels: []
location: europe-west4
@@ -3702,4 +3703,3 @@ outputs:
shared_vpc_self_links: __missing__
tfvars: __missing__
vpn_gateway_endpoints: __missing__
-
diff --git a/tests/modules/gke_hub/examples/full.yaml b/tests/modules/gke_hub/examples/full.yaml
index 9572e071a6..ee78e1d7cc 100644
--- a/tests/modules/gke_hub/examples/full.yaml
+++ b/tests/modules/gke_hub/examples/full.yaml
@@ -15,32 +15,32 @@
values:
module.cluster_1.google_container_cluster.cluster:
addons_config:
- - cloudrun_config:
- - disabled: true
- load_balancer_type: null
- config_connector_config:
- - enabled: false
- dns_cache_config:
- - enabled: false
- gce_persistent_disk_csi_driver_config:
- - enabled: false
- gcp_filestore_csi_driver_config:
- - enabled: false
- gcs_fuse_csi_driver_config:
- - enabled: false
- gke_backup_agent_config:
- - enabled: false
- horizontal_pod_autoscaling:
- - disabled: false
- http_load_balancing:
- - disabled: false
- istio_config:
- - auth: null
- disabled: true
- kalm_config:
- - enabled: false
- network_policy_config:
- - disabled: true
+ - cloudrun_config:
+ - disabled: true
+ load_balancer_type: null
+ config_connector_config:
+ - enabled: false
+ dns_cache_config:
+ - enabled: false
+ gce_persistent_disk_csi_driver_config:
+ - enabled: false
+ gcp_filestore_csi_driver_config:
+ - enabled: false
+ gcs_fuse_csi_driver_config:
+ - enabled: false
+ gke_backup_agent_config:
+ - enabled: false
+ horizontal_pod_autoscaling:
+ - disabled: false
+ http_load_balancing:
+ - disabled: false
+ istio_config:
+ - auth: null
+ disabled: true
+ kalm_config:
+ - enabled: false
+ network_policy_config:
+ - disabled: true
allow_net_admin: null
binary_authorization: []
datapath_provider: ADVANCED_DATAPATH
@@ -62,69 +62,69 @@ values:
initial_node_count: 1
location: europe-west1
logging_config:
- - enable_components:
- - SYSTEM_COMPONENTS
+ - enable_components:
+ - SYSTEM_COMPONENTS
maintenance_policy:
- - daily_maintenance_window:
- - start_time: 03:00
- maintenance_exclusion: []
- recurring_window: []
+ - daily_maintenance_window:
+ - start_time: 03:00
+ maintenance_exclusion: []
+ recurring_window: []
master_auth:
- - client_certificate_config:
- - issue_client_certificate: false
+ - client_certificate_config:
+ - issue_client_certificate: false
master_authorized_networks_config:
- - cidr_blocks:
- - cidr_block: 10.0.0.0/8
- display_name: rfc1918_10_8
+ - cidr_blocks:
+ - cidr_block: 10.0.0.0/8
+ display_name: rfc1918_10_8
min_master_version: null
monitoring_config:
- - enable_components:
- - SYSTEM_COMPONENTS
- managed_prometheus:
- - enabled: true
+ - enable_components:
+ - SYSTEM_COMPONENTS
+ managed_prometheus:
+ - enabled: true
name: cluster-1
network_policy: []
node_config:
- - advanced_machine_features: []
- boot_disk_kms_key: null
- enable_confidential_storage: null
- ephemeral_storage_config: []
- ephemeral_storage_local_ssd_config: []
- fast_socket: []
- gcfs_config: []
- gvnic: []
- host_maintenance_policy: []
- kubelet_config: []
- linux_node_config: []
- local_nvme_ssd_block_config: []
- node_group: null
- preemptible: false
- reservation_affinity: []
- resource_labels: null
- sandbox_config: []
- sole_tenant_config: []
- spot: false
- tags: null
- taint: []
+ - advanced_machine_features: []
+ boot_disk_kms_key: null
+ enable_confidential_storage: null
+ ephemeral_storage_config: []
+ ephemeral_storage_local_ssd_config: []
+ fast_socket: []
+ gcfs_config: []
+ gvnic: []
+ host_maintenance_policy: []
+ kubelet_config: []
+ linux_node_config: []
+ local_nvme_ssd_block_config: []
+ node_group: null
+ preemptible: false
+ reservation_affinity: []
+ resource_labels: null
+ sandbox_config: []
+ sole_tenant_config: []
+ spot: false
+ tags: null
+ taint: []
node_pool_defaults:
- - node_config_defaults:
- - gcfs_config:
- - enabled: false
+ - node_config_defaults:
+ - gcfs_config:
+ - enabled: false
pod_security_policy_config: []
private_cluster_config:
- - enable_private_endpoint: true
- enable_private_nodes: true
- master_global_access_config:
- - enabled: false
- master_ipv4_cidr_block: 192.168.0.0/28
- private_endpoint_subnetwork: null
+ - enable_private_endpoint: true
+ enable_private_nodes: true
+ master_global_access_config:
+ - enabled: false
+ master_ipv4_cidr_block: 192.168.0.0/28
+ private_endpoint_subnetwork: null
project: gkehub-test
remove_default_node_pool: true
resource_labels: null
resource_usage_export_config: []
timeouts: null
workload_identity_config:
- - workload_pool: gkehub-test.svc.id.goog
+ - workload_pool: gkehub-test.svc.id.goog
module.hub.google_gke_hub_feature.default["configmanagement"]:
fleet_default_member_config: []
labels: null
@@ -135,32 +135,32 @@ values:
timeouts: null
module.hub.google_gke_hub_feature_membership.default["cluster-1"]:
configmanagement:
- - config_sync:
- - git:
- - gcp_service_account_email: null
- https_proxy: null
- policy_dir: configsync
- secret_type: none
- sync_branch: main
- sync_repo: https://github.com/danielmarzini/configsync-platform-example
- sync_rev: null
- sync_wait_secs: null
- metrics_gcp_service_account_email: null
- oci: []
- source_format: hierarchy
- hierarchy_controller:
- - enable_hierarchical_resource_quota: true
- enable_pod_tree_labels: true
- enabled: true
- policy_controller:
- - audit_interval_seconds: '120'
- enabled: true
- exemptable_namespaces: null
- log_denies_enabled: true
- mutation_enabled: null
- referential_rules_enabled: true
- template_library_installed: true
- version: v1
+ - config_sync:
+ - git:
+ - gcp_service_account_email: null
+ https_proxy: null
+ policy_dir: configsync
+ secret_type: none
+ sync_branch: main
+ sync_repo: https://github.com/danielmarzini/configsync-platform-example
+ sync_rev: null
+ sync_wait_secs: null
+ metrics_gcp_service_account_email: null
+ oci: []
+ source_format: hierarchy
+ hierarchy_controller:
+ - enable_hierarchical_resource_quota: true
+ enable_pod_tree_labels: true
+ enabled: true
+ policy_controller:
+ - audit_interval_seconds: "120"
+ enabled: true
+ exemptable_namespaces: null
+ log_denies_enabled: true
+ mutation_enabled: null
+ referential_rules_enabled: true
+ template_library_installed: true
+ version: v1
feature: configmanagement
location: global
membership: cluster-1
@@ -172,8 +172,8 @@ values:
authority: []
description: null
endpoint:
- - gke_cluster:
- - {}
+ - gke_cluster:
+ - {}
labels: null
location: global
membership_id: cluster-1
@@ -182,33 +182,33 @@ values:
module.project.google_project.project[0]:
auto_create_network: false
billing_account: 123456-123456-123456
- folder_id: '12345'
+ folder_id: "12345"
labels: null
name: gkehub-test
org_id: null
project_id: gkehub-test
skip_delete: false
timeouts: null
- module.project.google_project_service.project_services["anthosconfigmanagement.googleapis.com"]:
- disable_dependent_services: false
+ ? module.project.google_project_service.project_services["anthosconfigmanagement.googleapis.com"]
+ : disable_dependent_services: false
disable_on_destroy: false
project: gkehub-test
service: anthosconfigmanagement.googleapis.com
timeouts: null
- module.project.google_project_service.project_services["container.googleapis.com"]:
- disable_dependent_services: false
+ ? module.project.google_project_service.project_services["container.googleapis.com"]
+ : disable_dependent_services: false
disable_on_destroy: false
project: gkehub-test
service: container.googleapis.com
timeouts: null
- module.project.google_project_service.project_services["gkeconnect.googleapis.com"]:
- disable_dependent_services: false
+ ? module.project.google_project_service.project_services["gkeconnect.googleapis.com"]
+ : disable_dependent_services: false
disable_on_destroy: false
project: gkehub-test
service: gkeconnect.googleapis.com
timeouts: null
- module.project.google_project_service.project_services["gkehub.googleapis.com"]:
- disable_dependent_services: false
+ ? module.project.google_project_service.project_services["gkehub.googleapis.com"]
+ : disable_dependent_services: false
disable_on_destroy: false
project: gkehub-test
service: gkehub.googleapis.com
@@ -219,24 +219,24 @@ values:
project: gkehub-test
service: mesh.googleapis.com
timeouts: null
- module.project.google_project_service.project_services["multiclusteringress.googleapis.com"]:
- disable_dependent_services: false
+ ? module.project.google_project_service.project_services["multiclusteringress.googleapis.com"]
+ : disable_dependent_services: false
disable_on_destroy: false
project: gkehub-test
service: multiclusteringress.googleapis.com
timeouts: null
- module.project.google_project_service.project_services["multiclusterservicediscovery.googleapis.com"]:
- disable_dependent_services: false
+ ? module.project.google_project_service.project_services["multiclusterservicediscovery.googleapis.com"]
+ : disable_dependent_services: false
disable_on_destroy: false
project: gkehub-test
service: multiclusterservicediscovery.googleapis.com
timeouts: null
- module.project.google_project_service_identity.jit_si["gkehub.googleapis.com"]:
- project: gkehub-test
+ ? module.project.google_project_service_identity.jit_si["gkehub.googleapis.com"]
+ : project: gkehub-test
service: gkehub.googleapis.com
timeouts: null
- module.project.google_project_service_identity.jit_si["multiclusteringress.googleapis.com"]:
- project: gkehub-test
+ ? module.project.google_project_service_identity.jit_si["multiclusteringress.googleapis.com"]
+ : project: gkehub-test
service: multiclusteringress.googleapis.com
timeouts: null
module.vpc.google_compute_network.network[0]:
@@ -283,7 +283,6 @@ values:
project: gkehub-test
region: europe-west1
role: null
- secondary_ip_range: []
timeouts: null
counts:
diff --git a/tests/modules/net_cloudnat/examples/hybrid.yaml b/tests/modules/net_cloudnat/examples/hybrid.yaml
index 4dd1939598..dbfdd49819 100644
--- a/tests/modules/net_cloudnat/examples/hybrid.yaml
+++ b/tests/modules/net_cloudnat/examples/hybrid.yaml
@@ -26,8 +26,8 @@ values:
enable_endpoint_independent_mapping: false
icmp_idle_timeout_sec: 30
log_config:
- - enable: false
- filter: ALL
+ - enable: false
+ filter: ALL
max_ports_per_vm: null
name: vpc1-nat
nat_ip_allocate_option: null
@@ -36,18 +36,18 @@ values:
region: europe-west8
router: vpc1-nat-nat
rules:
- - action:
- - source_nat_active_ips: []
- source_nat_drain_ips: []
- source_nat_drain_ranges: []
- description: private nat
- match: nexthop.is_hybrid
- rule_number: 0
+ - action:
+ - source_nat_active_ips: []
+ source_nat_drain_ips: []
+ source_nat_drain_ranges: []
+ description: private nat
+ match: nexthop.is_hybrid
+ rule_number: 0
source_subnetwork_ip_ranges_to_nat: LIST_OF_SUBNETWORKS
subnetwork:
- - secondary_ip_range_names: []
- source_ip_ranges_to_nat:
- - ALL_IP_RANGES
+ - secondary_ip_range_names: []
+ source_ip_ranges_to_nat:
+ - ALL_IP_RANGES
tcp_established_idle_timeout_sec: 1200
tcp_time_wait_timeout_sec: 120
tcp_transitory_idle_timeout_sec: 30
@@ -84,7 +84,6 @@ values:
project: project-id
region: europe-west8
role: null
- secondary_ip_range: []
counts:
google_compute_network: 1
diff --git a/tests/modules/net_vpc/examples/factory.yaml b/tests/modules/net_vpc/examples/factory.yaml
index 35227c7734..32f5aadb8f 100644
--- a/tests/modules/net_vpc/examples/factory.yaml
+++ b/tests/modules/net_vpc/examples/factory.yaml
@@ -58,8 +58,8 @@ values:
region: europe-west4
role: ACTIVE
timeouts: null
- module.vpc.google_compute_subnetwork.proxy_only["australia-southeast2/subnet-proxy-global"]:
- description: Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB.
+ ? module.vpc.google_compute_subnetwork.proxy_only["australia-southeast2/subnet-proxy-global"]
+ : description: Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB.
ip_cidr_range: 10.4.0.0/24
ipv6_access_type: null
log_config: []
@@ -80,24 +80,24 @@ values:
region: europe-west4
role: null
timeouts: null
- module.vpc.google_compute_subnetwork.subnetwork["europe-west1/subnet-detailed"]:
- description: Sample description
+ ? module.vpc.google_compute_subnetwork.subnetwork["europe-west1/subnet-detailed"]
+ : description: Sample description
ip_cidr_range: 10.0.0.0/24
ipv6_access_type: null
log_config:
- - aggregation_interval: INTERVAL_5_SEC
- filter_expr: 'true'
- flow_sampling: 0.5
- metadata: INCLUDE_ALL_METADATA
- metadata_fields: null
+ - aggregation_interval: INTERVAL_5_SEC
+ filter_expr: "true"
+ flow_sampling: 0.5
+ metadata: INCLUDE_ALL_METADATA
+ metadata_fields: null
name: subnet-detailed
private_ip_google_access: false
project: project-id
region: europe-west1
role: null
secondary_ip_range:
- - ip_cidr_range: 192.168.0.0/24
- range_name: secondary-range-a
+ - ip_cidr_range: 192.168.0.0/24
+ range_name: secondary-range-a
timeouts: null
module.vpc.google_compute_subnetwork.subnetwork["europe-west4/simple"]:
description: Terraform-managed.
@@ -109,7 +109,6 @@ values:
project: project-id
region: europe-west4
role: null
- secondary_ip_range: []
timeouts: null
module.vpc.google_compute_subnetwork.subnetwork["europe-west8/simple"]:
description: Terraform-managed.
@@ -121,14 +120,13 @@ values:
project: project-id
region: europe-west8
role: null
- secondary_ip_range: []
timeouts: null
- module.vpc.google_compute_subnetwork_iam_binding.authoritative["europe-west1/subnet-detailed.roles/compute.networkUser"]:
- condition: []
+ ? module.vpc.google_compute_subnetwork_iam_binding.authoritative["europe-west1/subnet-detailed.roles/compute.networkUser"]
+ : condition: []
members:
- - group:lorem@example.com
- - serviceAccount:fbz@prj.iam.gserviceaccount.com
- - user:foobar@example.com
+ - group:lorem@example.com
+ - serviceAccount:fbz@prj.iam.gserviceaccount.com
+ - user:foobar@example.com
project: project-id
region: europe-west1
role: roles/compute.networkUser
@@ -142,4 +140,4 @@ counts:
modules: 1
resources: 10
-outputs: {}
\ No newline at end of file
+outputs: {}
diff --git a/tests/modules/net_vpc/examples/firewall_policy_enforcement_order.yaml b/tests/modules/net_vpc/examples/firewall_policy_enforcement_order.yaml
index 6a9523396f..9ce65336b8 100644
--- a/tests/modules/net_vpc/examples/firewall_policy_enforcement_order.yaml
+++ b/tests/modules/net_vpc/examples/firewall_policy_enforcement_order.yaml
@@ -31,10 +31,10 @@ values:
region: europe-west1
role: null
secondary_ip_range:
- - ip_cidr_range: 172.16.0.0/20
- range_name: pods
- - ip_cidr_range: 192.168.0.0/24
- range_name: services
+ - ip_cidr_range: 172.16.0.0/20
+ range_name: pods
+ - ip_cidr_range: 192.168.0.0/24
+ range_name: services
module.vpc.google_compute_subnetwork.subnetwork["europe-west2/production"]:
description: Terraform-managed.
ip_cidr_range: 10.0.16.0/24
@@ -44,8 +44,7 @@ values:
project: project-id
region: europe-west2
role: null
- secondary_ip_range: []
counts:
google_compute_network: 1
- google_compute_subnetwork: 2
\ No newline at end of file
+ google_compute_subnetwork: 2
diff --git a/tests/modules/net_vpc/examples/ipv6.yaml b/tests/modules/net_vpc/examples/ipv6.yaml
index 267a24b759..c3e104882d 100644
--- a/tests/modules/net_vpc/examples/ipv6.yaml
+++ b/tests/modules/net_vpc/examples/ipv6.yaml
@@ -58,7 +58,6 @@ values:
project: project-id
region: europe-west1
role: null
- secondary_ip_range: []
stack_type: IPV4_IPV6
timeouts: null
module.vpc.google_compute_subnetwork.subnetwork["europe-west3/test"]:
@@ -71,7 +70,6 @@ values:
project: project-id
region: europe-west3
role: null
- secondary_ip_range: []
stack_type: IPV4_IPV6
timeouts: null
@@ -82,4 +80,4 @@ counts:
modules: 1
resources: 5
-outputs: {}
\ No newline at end of file
+outputs: {}
diff --git a/tests/modules/net_vpc/examples/psa-routes.yaml b/tests/modules/net_vpc/examples/psa-routes.yaml
index a9a8bfddb3..4744420bd1 100644
--- a/tests/modules/net_vpc/examples/psa-routes.yaml
+++ b/tests/modules/net_vpc/examples/psa-routes.yaml
@@ -13,8 +13,8 @@
# limitations under the License.
values:
- module.vpc.google_compute_global_address.psa_ranges["servicenetworking-googleapis-com-myrange"]:
- address: 10.0.1.0
+ ? module.vpc.google_compute_global_address.psa_ranges["servicenetworking-googleapis-com-myrange"]
+ : address: 10.0.1.0
address_type: INTERNAL
description: null
ip_version: null
@@ -33,8 +33,8 @@ values:
project: project-id
routing_mode: GLOBAL
timeouts: null
- module.vpc.google_compute_network_peering_routes_config.psa_routes["servicenetworking.googleapis.com"]:
- export_custom_routes: true
+ ? module.vpc.google_compute_network_peering_routes_config.psa_routes["servicenetworking.googleapis.com"]
+ : export_custom_routes: true
import_custom_routes: true
network: my-network
project: project-id
@@ -76,16 +76,15 @@ values:
project: project-id
region: europe-west1
role: null
- secondary_ip_range: []
timeouts: null
- module.vpc.google_service_networking_connection.psa_connection["servicenetworking.googleapis.com"]:
- deletion_policy: null
+ ? module.vpc.google_service_networking_connection.psa_connection["servicenetworking.googleapis.com"]
+ : deletion_policy: null
reserved_peering_ranges:
- - servicenetworking-googleapis-com-myrange
+ - servicenetworking-googleapis-com-myrange
service: servicenetworking.googleapis.com
timeouts: null
- module.vpc.google_service_networking_peered_dns_domain.name["servicenetworking-googleapis-com-gcp-example-com"]:
- dns_suffix: gcp.example.com.
+ ? module.vpc.google_service_networking_peered_dns_domain.name["servicenetworking-googleapis-com-gcp-example-com"]
+ : dns_suffix: gcp.example.com.
name: servicenetworking-googleapis-com-gcp-example-com
network: my-network
project: project-id
diff --git a/tests/modules/net_vpc/examples/psa.yaml b/tests/modules/net_vpc/examples/psa.yaml
index 806bf443f6..7ff46beb43 100644
--- a/tests/modules/net_vpc/examples/psa.yaml
+++ b/tests/modules/net_vpc/examples/psa.yaml
@@ -13,8 +13,8 @@
# limitations under the License.
values:
- module.vpc.google_compute_global_address.psa_ranges["servicenetworking-googleapis-com-myrange"]:
- address: 10.0.1.0
+ ? module.vpc.google_compute_global_address.psa_ranges["servicenetworking-googleapis-com-myrange"]
+ : address: 10.0.1.0
address_type: INTERNAL
description: null
ip_version: null
@@ -33,8 +33,8 @@ values:
project: project-id
routing_mode: GLOBAL
timeouts: null
- module.vpc.google_compute_network_peering_routes_config.psa_routes["servicenetworking.googleapis.com"]:
- export_custom_routes: false
+ ? module.vpc.google_compute_network_peering_routes_config.psa_routes["servicenetworking.googleapis.com"]
+ : export_custom_routes: false
import_custom_routes: false
network: my-network
project: project-id
@@ -76,12 +76,11 @@ values:
project: project-id
region: europe-west1
role: null
- secondary_ip_range: []
timeouts: null
- module.vpc.google_service_networking_connection.psa_connection["servicenetworking.googleapis.com"]:
- deletion_policy: null
+ ? module.vpc.google_service_networking_connection.psa_connection["servicenetworking.googleapis.com"]
+ : deletion_policy: null
reserved_peering_ranges:
- - servicenetworking-googleapis-com-myrange
+ - servicenetworking-googleapis-com-myrange
service: servicenetworking.googleapis.com
timeouts: null
diff --git a/tests/modules/net_vpc/examples/simple.yaml b/tests/modules/net_vpc/examples/simple.yaml
index 95e29f2e7e..9bbe4af635 100644
--- a/tests/modules/net_vpc/examples/simple.yaml
+++ b/tests/modules/net_vpc/examples/simple.yaml
@@ -30,10 +30,10 @@ values:
region: europe-west1
role: null
secondary_ip_range:
- - ip_cidr_range: 172.16.0.0/20
- range_name: pods
- - ip_cidr_range: 192.168.0.0/24
- range_name: services
+ - ip_cidr_range: 172.16.0.0/20
+ range_name: pods
+ - ip_cidr_range: 192.168.0.0/24
+ range_name: services
module.vpc.google_compute_subnetwork.subnetwork["europe-west2/production"]:
description: Terraform-managed.
ip_cidr_range: 10.0.16.0/24
@@ -43,7 +43,6 @@ values:
project: project-id
region: europe-west2
role: null
- secondary_ip_range: []
module.vpc.google_compute_route.gateway["private-googleapis"]:
dest_range: 199.36.153.8/30
name: my-network-private-googleapis
@@ -71,4 +70,4 @@ values:
counts:
google_compute_network: 1
google_compute_subnetwork: 2
- google_compute_route: 2
\ No newline at end of file
+ google_compute_route: 2
diff --git a/tests/modules/net_vpc/examples/subnet-iam.yaml b/tests/modules/net_vpc/examples/subnet-iam.yaml
index 8e15383734..a99d1c5db8 100644
--- a/tests/modules/net_vpc/examples/subnet-iam.yaml
+++ b/tests/modules/net_vpc/examples/subnet-iam.yaml
@@ -57,7 +57,6 @@ values:
project: project-id
region: europe-west1
role: null
- secondary_ip_range: []
timeouts: null
module.vpc.google_compute_subnetwork.subnetwork["europe-west1/subnet-2"]:
description: Terraform-managed.
@@ -69,23 +68,22 @@ values:
project: project-id
region: europe-west1
role: null
- secondary_ip_range: []
timeouts: null
- module.vpc.google_compute_subnetwork_iam_binding.authoritative["europe-west1/subnet-1.roles/compute.networkUser"]:
- condition: []
+ ? module.vpc.google_compute_subnetwork_iam_binding.authoritative["europe-west1/subnet-1.roles/compute.networkUser"]
+ : condition: []
members:
- - group:organization-admins@example.org
+ - group:organization-admins@example.org
project: project-id
region: europe-west1
role: roles/compute.networkUser
subnetwork: subnet-1
module.vpc.google_compute_subnetwork_iam_binding.bindings["subnet-1-iam"]:
condition:
- - description: null
- expression: resource.matchTag('123456789012/env', 'prod')
- title: test_condition
+ - description: null
+ expression: resource.matchTag('123456789012/env', 'prod')
+ title: test_condition
members:
- - group:organization-admins@example.org
+ - group:organization-admins@example.org
project: project-id
region: europe-west1
role: roles/compute.networkUser
@@ -107,4 +105,4 @@ counts:
modules: 1
resources: 8
-outputs: {}
\ No newline at end of file
+outputs: {}
diff --git a/tests/modules/net_vpc/examples/subnet-options.yaml b/tests/modules/net_vpc/examples/subnet-options.yaml
index 9fd35fa5a1..d500a9666b 100644
--- a/tests/modules/net_vpc/examples/subnet-options.yaml
+++ b/tests/modules/net_vpc/examples/subnet-options.yaml
@@ -24,7 +24,6 @@ values:
private_ip_google_access: false
project: project-id
region: europe-west1
- secondary_ip_range: []
module.vpc.google_compute_subnetwork.subnetwork["europe-west1/simple"]:
description: Terraform-managed.
ip_cidr_range: 10.0.0.0/24
@@ -33,25 +32,23 @@ values:
private_ip_google_access: true
project: project-id
region: europe-west1
- secondary_ip_range: []
- module.vpc.google_compute_subnetwork.subnetwork["europe-west1/with-flow-logs"]:
- description: Terraform-managed.
+ ? module.vpc.google_compute_subnetwork.subnetwork["europe-west1/with-flow-logs"]
+ : description: Terraform-managed.
ip_cidr_range: 10.0.3.0/24
ipv6_access_type: null
log_config:
- - aggregation_interval: INTERVAL_10_MIN
- filter_expr: 'true'
- flow_sampling: 0.5
- metadata: INCLUDE_ALL_METADATA
- metadata_fields: null
+ - aggregation_interval: INTERVAL_10_MIN
+ filter_expr: "true"
+ flow_sampling: 0.5
+ metadata: INCLUDE_ALL_METADATA
+ metadata_fields: null
name: with-flow-logs
private_ip_google_access: true
project: project-id
region: europe-west1
role: null
- secondary_ip_range: []
- module.vpc.google_compute_subnetwork.subnetwork["europe-west1/with-secondary-ranges"]:
- description: Terraform-managed.
+ ? module.vpc.google_compute_subnetwork.subnetwork["europe-west1/with-secondary-ranges"]
+ : description: Terraform-managed.
ip_cidr_range: 10.0.2.0/24
log_config: []
name: with-secondary-ranges
@@ -60,11 +57,11 @@ values:
region: europe-west1
role: null
secondary_ip_range:
- - ip_cidr_range: 192.168.0.0/24
- range_name: a
- - ip_cidr_range: 192.168.1.0/24
- range_name: b
+ - ip_cidr_range: 192.168.0.0/24
+ range_name: a
+ - ip_cidr_range: 192.168.1.0/24
+ range_name: b
counts:
google_compute_network: 1
- google_compute_subnetwork: 4
\ No newline at end of file
+ google_compute_subnetwork: 4