diff --git a/blueprints/gke/patterns/autopilot-cluster/versions.tf b/blueprints/gke/patterns/autopilot-cluster/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/blueprints/gke/patterns/autopilot-cluster/versions.tf +++ b/blueprints/gke/patterns/autopilot-cluster/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/blueprints/gke/patterns/batch/versions.tf b/blueprints/gke/patterns/batch/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/blueprints/gke/patterns/batch/versions.tf +++ b/blueprints/gke/patterns/batch/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/blueprints/gke/patterns/kafka/versions.tf b/blueprints/gke/patterns/kafka/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/blueprints/gke/patterns/kafka/versions.tf +++ b/blueprints/gke/patterns/kafka/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/blueprints/gke/patterns/mysql/versions.tf b/blueprints/gke/patterns/mysql/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/blueprints/gke/patterns/mysql/versions.tf +++ b/blueprints/gke/patterns/mysql/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/blueprints/gke/patterns/redis-cluster/versions.tf b/blueprints/gke/patterns/redis-cluster/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/blueprints/gke/patterns/redis-cluster/versions.tf +++ b/blueprints/gke/patterns/redis-cluster/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/default-versions.tf b/default-versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/default-versions.tf +++ b/default-versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/__experimental_deprecated/alloydb-instance/versions.tf b/modules/__experimental_deprecated/alloydb-instance/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/__experimental_deprecated/alloydb-instance/versions.tf +++ b/modules/__experimental_deprecated/alloydb-instance/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/__experimental_deprecated/net-neg/versions.tf b/modules/__experimental_deprecated/net-neg/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/__experimental_deprecated/net-neg/versions.tf +++ b/modules/__experimental_deprecated/net-neg/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/__experimental_deprecated/project-iam-magic/versions.tf b/modules/__experimental_deprecated/project-iam-magic/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/__experimental_deprecated/project-iam-magic/versions.tf +++ b/modules/__experimental_deprecated/project-iam-magic/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/analytics-hub/versions.tf b/modules/analytics-hub/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/analytics-hub/versions.tf +++ b/modules/analytics-hub/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/api-gateway/versions.tf b/modules/api-gateway/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/api-gateway/versions.tf +++ b/modules/api-gateway/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/apigee/versions.tf b/modules/apigee/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/apigee/versions.tf +++ b/modules/apigee/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/artifact-registry/versions.tf b/modules/artifact-registry/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/artifact-registry/versions.tf +++ b/modules/artifact-registry/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/bigquery-dataset/versions.tf b/modules/bigquery-dataset/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/bigquery-dataset/versions.tf +++ b/modules/bigquery-dataset/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/bigtable-instance/versions.tf b/modules/bigtable-instance/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/bigtable-instance/versions.tf +++ b/modules/bigtable-instance/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/billing-account/versions.tf b/modules/billing-account/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/billing-account/versions.tf +++ b/modules/billing-account/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/binauthz/versions.tf b/modules/binauthz/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/binauthz/versions.tf +++ b/modules/binauthz/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/cloud-config-container/__need_fixing/onprem/versions.tf b/modules/cloud-config-container/__need_fixing/onprem/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/cloud-config-container/__need_fixing/onprem/versions.tf +++ b/modules/cloud-config-container/__need_fixing/onprem/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/cloud-config-container/__need_fixing/squid/versions.tf b/modules/cloud-config-container/__need_fixing/squid/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/cloud-config-container/__need_fixing/squid/versions.tf +++ b/modules/cloud-config-container/__need_fixing/squid/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/cloud-config-container/bindplane/versions.tf b/modules/cloud-config-container/bindplane/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/cloud-config-container/bindplane/versions.tf +++ b/modules/cloud-config-container/bindplane/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/cloud-config-container/coredns/versions.tf b/modules/cloud-config-container/coredns/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/cloud-config-container/coredns/versions.tf +++ b/modules/cloud-config-container/coredns/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/cloud-config-container/cos-generic-metadata/versions.tf b/modules/cloud-config-container/cos-generic-metadata/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/cloud-config-container/cos-generic-metadata/versions.tf +++ b/modules/cloud-config-container/cos-generic-metadata/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/cloud-config-container/envoy-sni-dyn-fwd-proxy/versions.tf b/modules/cloud-config-container/envoy-sni-dyn-fwd-proxy/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/cloud-config-container/envoy-sni-dyn-fwd-proxy/versions.tf +++ b/modules/cloud-config-container/envoy-sni-dyn-fwd-proxy/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/cloud-config-container/envoy-traffic-director/versions.tf b/modules/cloud-config-container/envoy-traffic-director/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/cloud-config-container/envoy-traffic-director/versions.tf +++ b/modules/cloud-config-container/envoy-traffic-director/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/cloud-config-container/mysql/versions.tf b/modules/cloud-config-container/mysql/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/cloud-config-container/mysql/versions.tf +++ b/modules/cloud-config-container/mysql/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/cloud-config-container/nginx-tls/versions.tf b/modules/cloud-config-container/nginx-tls/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/cloud-config-container/nginx-tls/versions.tf +++ b/modules/cloud-config-container/nginx-tls/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/cloud-config-container/nginx/versions.tf b/modules/cloud-config-container/nginx/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/cloud-config-container/nginx/versions.tf +++ b/modules/cloud-config-container/nginx/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/cloud-config-container/simple-nva/versions.tf b/modules/cloud-config-container/simple-nva/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/cloud-config-container/simple-nva/versions.tf +++ b/modules/cloud-config-container/simple-nva/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/cloud-function-v1/versions.tf b/modules/cloud-function-v1/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/cloud-function-v1/versions.tf +++ b/modules/cloud-function-v1/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/cloud-function-v2/versions.tf b/modules/cloud-function-v2/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/cloud-function-v2/versions.tf +++ b/modules/cloud-function-v2/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/cloud-identity-group/versions.tf b/modules/cloud-identity-group/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/cloud-identity-group/versions.tf +++ b/modules/cloud-identity-group/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/cloud-run-v2/versions.tf b/modules/cloud-run-v2/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/cloud-run-v2/versions.tf +++ b/modules/cloud-run-v2/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/cloud-run/versions.tf b/modules/cloud-run/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/cloud-run/versions.tf +++ b/modules/cloud-run/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/cloudsql-instance/versions.tf b/modules/cloudsql-instance/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/cloudsql-instance/versions.tf +++ b/modules/cloudsql-instance/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/compute-mig/versions.tf b/modules/compute-mig/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/compute-mig/versions.tf +++ b/modules/compute-mig/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/compute-vm/versions.tf b/modules/compute-vm/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/compute-vm/versions.tf +++ b/modules/compute-vm/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/container-registry/versions.tf b/modules/container-registry/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/container-registry/versions.tf +++ b/modules/container-registry/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/data-catalog-policy-tag/versions.tf b/modules/data-catalog-policy-tag/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/data-catalog-policy-tag/versions.tf +++ b/modules/data-catalog-policy-tag/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/data-catalog-tag-template/versions.tf b/modules/data-catalog-tag-template/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/data-catalog-tag-template/versions.tf +++ b/modules/data-catalog-tag-template/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/data-catalog-tag/versions.tf b/modules/data-catalog-tag/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/data-catalog-tag/versions.tf +++ b/modules/data-catalog-tag/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/dataform-repository/versions.tf b/modules/dataform-repository/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/dataform-repository/versions.tf +++ b/modules/dataform-repository/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/datafusion/versions.tf b/modules/datafusion/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/datafusion/versions.tf +++ b/modules/datafusion/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/dataplex-datascan/versions.tf b/modules/dataplex-datascan/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/dataplex-datascan/versions.tf +++ b/modules/dataplex-datascan/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/dataplex/versions.tf b/modules/dataplex/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/dataplex/versions.tf +++ b/modules/dataplex/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/dataproc/versions.tf b/modules/dataproc/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/dataproc/versions.tf +++ b/modules/dataproc/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/dns-response-policy/versions.tf b/modules/dns-response-policy/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/dns-response-policy/versions.tf +++ b/modules/dns-response-policy/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/dns/versions.tf b/modules/dns/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/dns/versions.tf +++ b/modules/dns/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/endpoints/versions.tf b/modules/endpoints/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/endpoints/versions.tf +++ b/modules/endpoints/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/folder/versions.tf b/modules/folder/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/folder/versions.tf +++ b/modules/folder/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/gcs/versions.tf b/modules/gcs/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/gcs/versions.tf +++ b/modules/gcs/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/gcve-private-cloud/versions.tf b/modules/gcve-private-cloud/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/gcve-private-cloud/versions.tf +++ b/modules/gcve-private-cloud/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/gke-cluster-autopilot/versions.tf b/modules/gke-cluster-autopilot/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/gke-cluster-autopilot/versions.tf +++ b/modules/gke-cluster-autopilot/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/gke-cluster-standard/versions.tf b/modules/gke-cluster-standard/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/gke-cluster-standard/versions.tf +++ b/modules/gke-cluster-standard/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/gke-hub/versions.tf b/modules/gke-hub/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/gke-hub/versions.tf +++ b/modules/gke-hub/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/gke-nodepool/versions.tf b/modules/gke-nodepool/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/gke-nodepool/versions.tf +++ b/modules/gke-nodepool/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/iam-service-account/versions.tf b/modules/iam-service-account/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/iam-service-account/versions.tf +++ b/modules/iam-service-account/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/kms/versions.tf b/modules/kms/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/kms/versions.tf +++ b/modules/kms/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/logging-bucket/versions.tf b/modules/logging-bucket/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/logging-bucket/versions.tf +++ b/modules/logging-bucket/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/ncc-spoke-ra/versions.tf b/modules/ncc-spoke-ra/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/ncc-spoke-ra/versions.tf +++ b/modules/ncc-spoke-ra/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/net-address/versions.tf b/modules/net-address/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/net-address/versions.tf +++ b/modules/net-address/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/net-cloudnat/versions.tf b/modules/net-cloudnat/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/net-cloudnat/versions.tf +++ b/modules/net-cloudnat/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/net-firewall-policy/versions.tf b/modules/net-firewall-policy/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/net-firewall-policy/versions.tf +++ b/modules/net-firewall-policy/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/net-ipsec-over-interconnect/versions.tf b/modules/net-ipsec-over-interconnect/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/net-ipsec-over-interconnect/versions.tf +++ b/modules/net-ipsec-over-interconnect/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/net-lb-app-ext-regional/versions.tf b/modules/net-lb-app-ext-regional/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/net-lb-app-ext-regional/versions.tf +++ b/modules/net-lb-app-ext-regional/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/net-lb-app-ext/versions.tf b/modules/net-lb-app-ext/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/net-lb-app-ext/versions.tf +++ b/modules/net-lb-app-ext/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/net-lb-app-int-cross-region/versions.tf b/modules/net-lb-app-int-cross-region/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/net-lb-app-int-cross-region/versions.tf +++ b/modules/net-lb-app-int-cross-region/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/net-lb-app-int/versions.tf b/modules/net-lb-app-int/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/net-lb-app-int/versions.tf +++ b/modules/net-lb-app-int/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/net-lb-ext/versions.tf b/modules/net-lb-ext/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/net-lb-ext/versions.tf +++ b/modules/net-lb-ext/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/net-lb-int/versions.tf b/modules/net-lb-int/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/net-lb-int/versions.tf +++ b/modules/net-lb-int/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/net-lb-proxy-int/versions.tf b/modules/net-lb-proxy-int/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/net-lb-proxy-int/versions.tf +++ b/modules/net-lb-proxy-int/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/net-swp/versions.tf b/modules/net-swp/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/net-swp/versions.tf +++ b/modules/net-swp/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/net-vlan-attachment/versions.tf b/modules/net-vlan-attachment/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/net-vlan-attachment/versions.tf +++ b/modules/net-vlan-attachment/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/net-vpc-firewall/versions.tf b/modules/net-vpc-firewall/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/net-vpc-firewall/versions.tf +++ b/modules/net-vpc-firewall/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/net-vpc-peering/versions.tf b/modules/net-vpc-peering/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/net-vpc-peering/versions.tf +++ b/modules/net-vpc-peering/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/net-vpc/README.md b/modules/net-vpc/README.md index fb115804c2..543482ec9a 100644 --- a/modules/net-vpc/README.md +++ b/modules/net-vpc/README.md @@ -663,11 +663,11 @@ module "vpc" { | [routing_mode](variables.tf#L228) | The network routing mode (default 'GLOBAL'). | string | | "GLOBAL" | | [shared_vpc_host](variables.tf#L238) | Enable shared VPC for this project. | bool | | false | | [shared_vpc_service_projects](variables.tf#L244) | Shared VPC service projects to register with this host. | list(string) | | [] | -| [subnets](variables.tf#L250) | Subnet configuration. | list(object({…})) | | [] | -| [subnets_private_nat](variables.tf#L297) | List of private NAT subnets. | list(object({…})) | | [] | -| [subnets_proxy_only](variables.tf#L309) | List of proxy-only subnets for Regional HTTPS or Internal HTTPS load balancers. Note: Only one proxy-only subnet for each VPC network in each region can be active. | list(object({…})) | | [] | -| [subnets_psc](variables.tf#L343) | List of subnets for Private Service Connect service producers. | list(object({…})) | | [] | -| [vpc_create](variables.tf#L375) | Create VPC. When set to false, uses a data source to reference existing VPC. | bool | | true | +| [subnets](variables.tf#L250) | Subnet configuration. | list(object({…})) | | [] | +| [subnets_private_nat](variables.tf#L296) | List of private NAT subnets. | list(object({…})) | | [] | +| [subnets_proxy_only](variables.tf#L308) | List of proxy-only subnets for Regional HTTPS or Internal HTTPS load balancers. Note: Only one proxy-only subnet for each VPC network in each region can be active. | list(object({…})) | | [] | +| [subnets_psc](variables.tf#L342) | List of subnets for Private Service Connect service producers. | list(object({…})) | | [] | +| [vpc_create](variables.tf#L374) | Create VPC. When set to false, uses a data source to reference existing VPC. | bool | | true | ## Outputs diff --git a/modules/net-vpc/subnets.tf b/modules/net-vpc/subnets.tf index 09d4748d00..d0af04b2e9 100644 --- a/modules/net-vpc/subnets.tf +++ b/modules/net-vpc/subnets.tf @@ -147,10 +147,6 @@ resource "google_compute_subnetwork" "subnetwork" { : each.value.description ) private_ip_google_access = each.value.enable_private_access - secondary_ip_range = each.value.secondary_ip_ranges == null ? [] : [ - for name, range in each.value.secondary_ip_ranges : - { range_name = name, ip_cidr_range = range } - ] stack_type = ( try(each.value.ipv6, null) != null ? "IPV4_IPV6" : null ) @@ -158,6 +154,22 @@ resource "google_compute_subnetwork" "subnetwork" { try(each.value.ipv6, null) != null ? each.value.ipv6.access_type : null ) # private_ipv6_google_access = try(each.value.ipv6.enable_private_access, null) + dynamic "secondary_ip_range" { + for_each = each.value.secondary_ip_ranges == null ? {} : each.value.secondary_ip_ranges + content { + range_name = secondary_ip_range.key + ip_cidr_range = ( + startswith(secondary_ip_range.value, "networkconnectivity.googleapis.com") + ? null + : secondary_ip_range.value + ) + reserved_internal_range = ( + startswith(secondary_ip_range.value, "networkconnectivity.googleapis.com") + ? secondary_ip_range.value + : null + ) + } + } dynamic "log_config" { for_each = each.value.flow_logs_config != null ? [""] : [] content { diff --git a/modules/net-vpc/variables.tf b/modules/net-vpc/variables.tf index 6fd011bec8..4bee5de510 100644 --- a/modules/net-vpc/variables.tf +++ b/modules/net-vpc/variables.tf @@ -269,8 +269,7 @@ variable "subnets" { # enable_private_access = optional(string) })) secondary_ip_ranges = optional(map(string)) - - iam = optional(map(list(string)), {}) + iam = optional(map(list(string)), {}) iam_bindings = optional(map(object({ role = string members = list(string) diff --git a/modules/net-vpc/versions.tf b/modules/net-vpc/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/net-vpc/versions.tf +++ b/modules/net-vpc/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/net-vpn-dynamic/versions.tf b/modules/net-vpn-dynamic/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/net-vpn-dynamic/versions.tf +++ b/modules/net-vpn-dynamic/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/net-vpn-ha/versions.tf b/modules/net-vpn-ha/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/net-vpn-ha/versions.tf +++ b/modules/net-vpn-ha/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/net-vpn-static/versions.tf b/modules/net-vpn-static/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/net-vpn-static/versions.tf +++ b/modules/net-vpn-static/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/organization/versions.tf b/modules/organization/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/organization/versions.tf +++ b/modules/organization/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/project/versions.tf b/modules/project/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/project/versions.tf +++ b/modules/project/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/projects-data-source/versions.tf b/modules/projects-data-source/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/projects-data-source/versions.tf +++ b/modules/projects-data-source/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/pubsub/versions.tf b/modules/pubsub/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/pubsub/versions.tf +++ b/modules/pubsub/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/secret-manager/versions.tf b/modules/secret-manager/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/secret-manager/versions.tf +++ b/modules/secret-manager/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/service-directory/versions.tf b/modules/service-directory/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/service-directory/versions.tf +++ b/modules/service-directory/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/source-repository/versions.tf b/modules/source-repository/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/source-repository/versions.tf +++ b/modules/source-repository/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/vpc-sc/versions.tf b/modules/vpc-sc/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/vpc-sc/versions.tf +++ b/modules/vpc-sc/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/modules/workstation-cluster/versions.tf b/modules/workstation-cluster/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/modules/workstation-cluster/versions.tf +++ b/modules/workstation-cluster/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/tests/examples_e2e/setup_module/versions.tf b/tests/examples_e2e/setup_module/versions.tf index bc9986b3c7..05e52b2db2 100644 --- a/tests/examples_e2e/setup_module/versions.tf +++ b/tests/examples_e2e/setup_module/versions.tf @@ -17,11 +17,11 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } google-beta = { source = "hashicorp/google-beta" - version = ">= 5.26.0, < 6.0.0" # tftest + version = ">= 5.29.0, < 6.0.0" # tftest } } } diff --git a/tests/fast/stages/s2_networking_e_nva_bgp/simple.yaml b/tests/fast/stages/s2_networking_e_nva_bgp/simple.yaml index 25ba7ccf9b..e0316d393e 100644 --- a/tests/fast/stages/s2_networking_e_nva_bgp/simple.yaml +++ b/tests/fast/stages/s2_networking_e_nva_bgp/simple.yaml @@ -112,21 +112,22 @@ values: alert_strategy: [] combiner: OR conditions: - - condition_absent: [] - condition_matched_log: [] - condition_monitoring_query_language: - - duration: 120s - evaluation_missing_data: null - query: fetch vpn_gateway| { metric vpn.googleapis.com/network/sent_bytes_count; - metric vpn.googleapis.com/network/received_bytes_count }| align rate (1m)| - group_by [metric.tunnel_name]| outer_join 0,0| value val(0) + val(1)| condition - val() > 187.5 "MBy/s" - trigger: - - count: 1 - percent: null - condition_prometheus_query_language: [] - condition_threshold: [] - display_name: VPN Tunnel Bandwidth usage + - condition_absent: [] + condition_matched_log: [] + condition_monitoring_query_language: + - duration: 120s + evaluation_missing_data: null + query: + fetch vpn_gateway| { metric vpn.googleapis.com/network/sent_bytes_count; + metric vpn.googleapis.com/network/received_bytes_count }| align rate (1m)| + group_by [metric.tunnel_name]| outer_join 0,0| value val(0) + val(1)| condition + val() > 187.5 "MBy/s" + trigger: + - count: 1 + percent: null + condition_prometheus_query_language: [] + condition_threshold: [] + display_name: VPN Tunnel Bandwidth usage display_name: VPN Tunnel Bandwidth usage documentation: [] enabled: true @@ -139,20 +140,21 @@ values: alert_strategy: [] combiner: OR conditions: - - condition_absent: [] - condition_matched_log: [] - condition_monitoring_query_language: - - duration: 120s - evaluation_missing_data: null - query: 'fetch vpn_gateway| metric vpn.googleapis.com/tunnel_established| group_by - 5m, [value_tunnel_established_max: max(value.tunnel_established)]| every - 5m| condition val() < 1 ''1''' - trigger: - - count: 1 - percent: null - condition_prometheus_query_language: [] - condition_threshold: [] - display_name: VPN Tunnel Established + - condition_absent: [] + condition_matched_log: [] + condition_monitoring_query_language: + - duration: 120s + evaluation_missing_data: null + query: + "fetch vpn_gateway| metric vpn.googleapis.com/tunnel_established| group_by + 5m, [value_tunnel_established_max: max(value.tunnel_established)]| every + 5m| condition val() < 1 '1'" + trigger: + - count: 1 + percent: null + condition_prometheus_query_language: [] + condition_threshold: [] + display_name: VPN Tunnel Established display_name: VPN Tunnel Established documentation: [] enabled: true @@ -162,15 +164,17 @@ values: timeouts: null user_labels: null google_monitoring_dashboard.dashboard["firewall_insights.json"]: - dashboard_json: '{"displayName":"Firewall Insights Monitoring","gridLayout":{"columns":"2","widgets":[{"title":"Subnet + dashboard_json: + '{"displayName":"Firewall Insights Monitoring","gridLayout":{"columns":"2","widgets":[{"title":"Subnet Firewall Hit Counts","xyChart":{"chartOptions":{"mode":"COLOR"},"dataSets":[{"minAlignmentPeriod":"60s","plotType":"LINE","targetAxis":"Y1","timeSeriesQuery":{"timeSeriesFilter":{"aggregation":{"perSeriesAligner":"ALIGN_RATE"},"filter":"metric.type=\"firewallinsights.googleapis.com/subnet/firewall_hit_count\" resource.type=\"gce_subnetwork\"","secondaryAggregation":{}},"unitOverride":"1"}}],"timeshiftDuration":"0s","yAxis":{"label":"y1Axis","scale":"LINEAR"}}},{"title":"VM Firewall Hit Counts","xyChart":{"chartOptions":{"mode":"COLOR"},"dataSets":[{"minAlignmentPeriod":"60s","plotType":"LINE","targetAxis":"Y1","timeSeriesQuery":{"timeSeriesFilter":{"aggregation":{"perSeriesAligner":"ALIGN_RATE"},"filter":"metric.type=\"firewallinsights.googleapis.com/vm/firewall_hit_count\" resource.type=\"gce_instance\"","secondaryAggregation":{}},"unitOverride":"1"}}],"timeshiftDuration":"0s","yAxis":{"label":"y1Axis","scale":"LINEAR"}}}]}}' project: fast2-prod-net-landing-0 timeouts: null - google_monitoring_dashboard.dashboard["vpc_and_vpc_peering_group_quotas.json"]: - dashboard_json: '{"dashboardFilters":[],"displayName":"VPC \u0026 VPC Peering + ? google_monitoring_dashboard.dashboard["vpc_and_vpc_peering_group_quotas.json"] + : dashboard_json: + '{"dashboardFilters":[],"displayName":"VPC \u0026 VPC Peering Group Quotas","labels":{},"mosaicLayout":{"columns":12,"tiles":[{"height":4,"widget":{"title":"Internal network (L4) Load Balancers per VPC Peering Group","xyChart":{"chartOptions":{"mode":"COLOR"},"dataSets":[{"breakdowns":[],"dimensions":[],"measures":[],"plotType":"LINE","targetAxis":"Y1","timeSeriesQuery":{"timeSeriesQueryLanguage":"fetch compute.googleapis.com/VpcNetwork\n|{ metric\n compute.googleapis.com/quota/internal_lb_forwarding_rules_per_peering_group/usage\n | @@ -223,7 +227,8 @@ values: project: fast2-prod-net-landing-0 timeouts: null google_monitoring_dashboard.dashboard["vpn.json"]: - dashboard_json: '{"displayName":"VPN Monitoring","mosaicLayout":{"columns":12,"tiles":[{"height":4,"widget":{"title":"Number + dashboard_json: + '{"displayName":"VPN Monitoring","mosaicLayout":{"columns":12,"tiles":[{"height":4,"widget":{"title":"Number of connections","xyChart":{"chartOptions":{"mode":"COLOR"},"dataSets":[{"minAlignmentPeriod":"60s","plotType":"LINE","targetAxis":"Y1","timeSeriesQuery":{"timeSeriesFilter":{"aggregation":{"perSeriesAligner":"ALIGN_MEAN"},"filter":"metric.type=\"vpn.googleapis.com/gateway/connections\" resource.type=\"vpn_gateway\"","secondaryAggregation":{}},"unitOverride":"1"}}],"timeshiftDuration":"0s","yAxis":{"label":"y1Axis","scale":"LINEAR"}}},"width":4},{"height":4,"widget":{"title":"Tunnel established","xyChart":{"chartOptions":{"mode":"COLOR"},"dataSets":[{"minAlignmentPeriod":"60s","plotType":"LINE","targetAxis":"Y1","timeSeriesQuery":{"timeSeriesFilter":{"aggregation":{"perSeriesAligner":"ALIGN_MEAN"},"filter":"metric.type=\"vpn.googleapis.com/tunnel_established\" @@ -273,9 +278,9 @@ values: source: null temporary_hold: null timeouts: null - module.dev-dns-peer-landing-rev-10.google_dns_managed_zone.dns_managed_zone[0]: - cloud_logging_config: - - enable_logging: false + ? module.dev-dns-peer-landing-rev-10.google_dns_managed_zone.dns_managed_zone[0] + : cloud_logging_config: + - enable_logging: false description: Terraform managed. dns_name: 10.in-addr.arpa. dnssec_config: [] @@ -290,7 +295,7 @@ values: visibility: private module.dev-dns-peer-landing-root.google_dns_managed_zone.dns_managed_zone[0]: cloud_logging_config: - - enable_logging: false + - enable_logging: false description: Terraform managed. dns_name: . dnssec_config: [] @@ -305,7 +310,7 @@ values: visibility: private module.dev-dns-private-zone.google_dns_managed_zone.dns_managed_zone[0]: cloud_logging_config: - - enable_logging: false + - enable_logging: false description: Terraform managed. dns_name: dev.gcp.example.com. dnssec_config: [] @@ -318,23 +323,23 @@ values: service_directory_config: [] timeouts: null visibility: private - module.dev-dns-private-zone.google_dns_record_set.dns_record_set["A localhost"]: - managed_zone: dev-gcp-example-com + ? module.dev-dns-private-zone.google_dns_record_set.dns_record_set["A localhost"] + : managed_zone: dev-gcp-example-com name: localhost.dev.gcp.example.com. project: fast2-dev-net-spoke-0 routing_policy: [] rrdatas: - - 127.0.0.1 + - 127.0.0.1 ttl: 300 type: A - module.dev-spoke-firewall.google_compute_firewall.custom-rules["ingress-allow-composer-nodes"]: - allow: - - ports: - - '80' - - '443' - - '3306' - - '3307' - protocol: tcp + ? module.dev-spoke-firewall.google_compute_firewall.custom-rules["ingress-allow-composer-nodes"] + : allow: + - ports: + - "80" + - "443" + - "3306" + - "3307" + protocol: tcp deny: [] description: Allow traffic to Composer nodes. direction: INGRESS @@ -347,17 +352,17 @@ values: source_ranges: null source_service_accounts: null source_tags: - - composer-worker + - composer-worker target_service_accounts: null target_tags: - - composer-worker - timeouts: null - module.dev-spoke-firewall.google_compute_firewall.custom-rules["ingress-allow-dataflow-load"]: - allow: - - ports: - - '12345' - - '12346' - protocol: tcp + - composer-worker + timeouts: null + ? module.dev-spoke-firewall.google_compute_firewall.custom-rules["ingress-allow-dataflow-load"] + : allow: + - ports: + - "12345" + - "12346" + protocol: tcp deny: [] description: Allow traffic to Dataflow nodes. direction: INGRESS @@ -370,37 +375,37 @@ values: source_ranges: null source_service_accounts: null source_tags: - - dataflow + - dataflow target_service_accounts: null target_tags: - - dataflow + - dataflow timeouts: null - module.dev-spoke-firewall.google_compute_firewall.custom-rules["ingress-default-deny"]: - allow: [] + ? module.dev-spoke-firewall.google_compute_firewall.custom-rules["ingress-default-deny"] + : allow: [] deny: - - ports: [] - protocol: all + - ports: [] + protocol: all description: Deny and log any unmatched ingress traffic. direction: INGRESS disabled: false log_config: - - metadata: EXCLUDE_ALL_METADATA + - metadata: EXCLUDE_ALL_METADATA name: ingress-default-deny network: dev-spoke-0 priority: 65535 project: fast2-dev-net-spoke-0 source_ranges: - - 0.0.0.0/0 + - 0.0.0.0/0 source_service_accounts: null source_tags: null target_service_accounts: null target_tags: null timeouts: null - module.dev-spoke-project.google_compute_shared_vpc_host_project.shared_vpc_host[0]: - project: fast2-dev-net-spoke-0 + ? module.dev-spoke-project.google_compute_shared_vpc_host_project.shared_vpc_host[0] + : project: fast2-dev-net-spoke-0 timeouts: null - module.dev-spoke-project.google_monitoring_monitored_project.primary["fast2-prod-net-landing-0"]: - metrics_scope: fast2-prod-net-landing-0 + ? module.dev-spoke-project.google_monitoring_monitored_project.primary["fast2-prod-net-landing-0"] + : metrics_scope: fast2-prod-net-landing-0 name: fast2-dev-net-spoke-0 timeouts: null module.dev-spoke-project.google_project.project[0]: @@ -413,69 +418,69 @@ values: project_id: fast2-dev-net-spoke-0 skip_delete: false timeouts: null - module.dev-spoke-project.google_project_iam_binding.authoritative["roles/dns.admin"]: - condition: [] + ? module.dev-spoke-project.google_project_iam_binding.authoritative["roles/dns.admin"] + : condition: [] members: - - serviceAccount:string + - serviceAccount:string project: fast2-dev-net-spoke-0 role: roles/dns.admin - module.dev-spoke-project.google_project_iam_binding.bindings["sa_delegated_grants"]: - condition: - - description: Development host project delegated grants. - expression: api.getAttribute('iam.googleapis.com/modifiedGrantsByRole', []).hasOnly(['roles/composer.sharedVpcAgent','roles/compute.networkUser','roles/compute.networkViewer','roles/container.hostServiceAgentUser','roles/multiclusterservicediscovery.serviceAgent','roles/vpcaccess.user']) - title: dev_stage3_sa_delegated_grants + ? module.dev-spoke-project.google_project_iam_binding.bindings["sa_delegated_grants"] + : condition: + - description: Development host project delegated grants. + expression: api.getAttribute('iam.googleapis.com/modifiedGrantsByRole', []).hasOnly(['roles/composer.sharedVpcAgent','roles/compute.networkUser','roles/compute.networkViewer','roles/container.hostServiceAgentUser','roles/multiclusterservicediscovery.serviceAgent','roles/vpcaccess.user']) + title: dev_stage3_sa_delegated_grants members: - - serviceAccount:string + - serviceAccount:string project: fast2-dev-net-spoke-0 role: roles/resourcemanager.projectIamAdmin module.dev-spoke-project.google_project_iam_member.servicenetworking[0]: condition: [] project: fast2-dev-net-spoke-0 role: roles/servicenetworking.serviceAgent - module.dev-spoke-project.google_project_service.project_services["compute.googleapis.com"]: - disable_dependent_services: false + ? module.dev-spoke-project.google_project_service.project_services["compute.googleapis.com"] + : disable_dependent_services: false disable_on_destroy: false project: fast2-dev-net-spoke-0 service: compute.googleapis.com timeouts: null - module.dev-spoke-project.google_project_service.project_services["dns.googleapis.com"]: - disable_dependent_services: false + ? module.dev-spoke-project.google_project_service.project_services["dns.googleapis.com"] + : disable_dependent_services: false disable_on_destroy: false project: fast2-dev-net-spoke-0 service: dns.googleapis.com timeouts: null - module.dev-spoke-project.google_project_service.project_services["iap.googleapis.com"]: - disable_dependent_services: false + ? module.dev-spoke-project.google_project_service.project_services["iap.googleapis.com"] + : disable_dependent_services: false disable_on_destroy: false project: fast2-dev-net-spoke-0 service: iap.googleapis.com timeouts: null - module.dev-spoke-project.google_project_service.project_services["networkmanagement.googleapis.com"]: - disable_dependent_services: false + ? module.dev-spoke-project.google_project_service.project_services["networkmanagement.googleapis.com"] + : disable_dependent_services: false disable_on_destroy: false project: fast2-dev-net-spoke-0 service: networkmanagement.googleapis.com timeouts: null - module.dev-spoke-project.google_project_service.project_services["servicenetworking.googleapis.com"]: - disable_dependent_services: false + ? module.dev-spoke-project.google_project_service.project_services["servicenetworking.googleapis.com"] + : disable_dependent_services: false disable_on_destroy: false project: fast2-dev-net-spoke-0 service: servicenetworking.googleapis.com timeouts: null - module.dev-spoke-project.google_project_service.project_services["stackdriver.googleapis.com"]: - disable_dependent_services: false + ? module.dev-spoke-project.google_project_service.project_services["stackdriver.googleapis.com"] + : disable_dependent_services: false disable_on_destroy: false project: fast2-dev-net-spoke-0 service: stackdriver.googleapis.com timeouts: null - module.dev-spoke-project.google_project_service.project_services["vpcaccess.googleapis.com"]: - disable_dependent_services: false + ? module.dev-spoke-project.google_project_service.project_services["vpcaccess.googleapis.com"] + : disable_dependent_services: false disable_on_destroy: false project: fast2-dev-net-spoke-0 service: vpcaccess.googleapis.com timeouts: null - module.dev-spoke-project.google_project_service_identity.jit_si["iap.googleapis.com"]: - project: fast2-dev-net-spoke-0 + ? module.dev-spoke-project.google_project_service_identity.jit_si["iap.googleapis.com"] + : project: fast2-dev-net-spoke-0 service: iap.googleapis.com timeouts: null module.dev-spoke-project.google_project_service_identity.servicenetworking[0]: @@ -519,8 +524,8 @@ values: project: fast2-dev-net-spoke-0 tags: null timeouts: null - module.dev-spoke-vpc.google_compute_subnetwork.subnetwork["europe-west1/dev-dataplatform"]: - description: Default subnet for dev Data Platform + ? module.dev-spoke-vpc.google_compute_subnetwork.subnetwork["europe-west1/dev-dataplatform"] + : description: Default subnet for dev Data Platform ip_cidr_range: 10.68.2.0/24 ipv6_access_type: null log_config: [] @@ -531,13 +536,13 @@ values: region: europe-west1 role: null secondary_ip_range: - - ip_cidr_range: 100.69.0.0/16 - range_name: pods - - ip_cidr_range: 100.71.2.0/24 - range_name: services + - ip_cidr_range: 100.69.0.0/16 + range_name: pods + - ip_cidr_range: 100.71.2.0/24 + range_name: services timeouts: null - module.dev-spoke-vpc.google_compute_subnetwork.subnetwork["europe-west1/dev-default"]: - description: Default europe-west1 subnet for dev + ? module.dev-spoke-vpc.google_compute_subnetwork.subnetwork["europe-west1/dev-default"] + : description: Default europe-west1 subnet for dev ip_cidr_range: 10.68.0.0/24 ipv6_access_type: null log_config: [] @@ -547,10 +552,9 @@ values: project: fast2-dev-net-spoke-0 region: europe-west1 role: null - secondary_ip_range: [] timeouts: null - module.dev-spoke-vpc.google_compute_subnetwork.subnetwork["europe-west1/dev-gke-nodes"]: - description: Default subnet for prod gke nodes + ? module.dev-spoke-vpc.google_compute_subnetwork.subnetwork["europe-west1/dev-gke-nodes"] + : description: Default subnet for prod gke nodes ip_cidr_range: 10.68.1.0/24 ipv6_access_type: null log_config: [] @@ -561,13 +565,13 @@ values: region: europe-west1 role: null secondary_ip_range: - - ip_cidr_range: 100.68.0.0/16 - range_name: pods - - ip_cidr_range: 100.71.1.0/24 - range_name: services + - ip_cidr_range: 100.68.0.0/16 + range_name: pods + - ip_cidr_range: 100.71.1.0/24 + range_name: services timeouts: null - module.dev-spoke-vpc.google_compute_subnetwork.subnetwork["europe-west4/dev-default"]: - description: Default europe-west4 subnet for dev + ? module.dev-spoke-vpc.google_compute_subnetwork.subnetwork["europe-west4/dev-default"] + : description: Default europe-west4 subnet for dev ip_cidr_range: 10.84.0.0/24 ipv6_access_type: null log_config: [] @@ -577,7 +581,6 @@ values: project: fast2-dev-net-spoke-0 region: europe-west4 role: null - secondary_ip_range: [] timeouts: null module.dev-spoke-vpc.google_dns_policy.default[0]: alternative_name_server_config: [] @@ -586,14 +589,14 @@ values: enable_logging: true name: dev-spoke-0 networks: - - {} + - {} project: fast2-dev-net-spoke-0 timeouts: null - module.dmz-firewall.google_compute_firewall.custom-rules["allow-hc-nva-ssh-dmz"]: - allow: - - ports: - - '22' - protocol: tcp + ? module.dmz-firewall.google_compute_firewall.custom-rules["allow-hc-nva-ssh-dmz"] + : allow: + - ports: + - "22" + protocol: tcp deny: [] description: Allow traffic from Google healthchecks to NVA appliances direction: INGRESS @@ -604,20 +607,20 @@ values: priority: 1000 project: fast2-prod-net-landing-0 source_ranges: - - 130.211.0.0/22 - - 209.85.152.0/22 - - 209.85.204.0/22 - - 35.191.0.0/16 + - 130.211.0.0/22 + - 209.85.152.0/22 + - 209.85.204.0/22 + - 35.191.0.0/16 source_service_accounts: null source_tags: null target_service_accounts: null target_tags: null timeouts: null - module.dmz-firewall.google_compute_firewall.custom-rules["allow-ncc-nva-bgp-dmz"]: - allow: - - ports: - - '179' - protocol: tcp + ? module.dmz-firewall.google_compute_firewall.custom-rules["allow-ncc-nva-bgp-dmz"] + : allow: + - ports: + - "179" + protocol: tcp deny: [] description: Allow BGP traffic from NCC Cloud Routers to NVAs direction: INGRESS @@ -628,21 +631,21 @@ values: priority: 1000 project: fast2-prod-net-landing-0 source_ranges: - - 10.128.0.201/32 - - 10.128.0.202/32 - - 10.128.32.201/32 - - 10.128.32.202/32 + - 10.128.0.201/32 + - 10.128.0.202/32 + - 10.128.32.201/32 + - 10.128.32.202/32 source_service_accounts: null source_tags: null target_service_accounts: null target_tags: - - nva + - nva timeouts: null - module.dmz-firewall.google_compute_firewall.custom-rules["allow-nva-nva-bgp-dmz"]: - allow: - - ports: - - '179' - protocol: tcp + ? module.dmz-firewall.google_compute_firewall.custom-rules["allow-nva-nva-bgp-dmz"] + : allow: + - ports: + - "179" + protocol: tcp deny: [] description: Allow BGP traffic from cross-regional NVAs direction: INGRESS @@ -655,27 +658,27 @@ values: source_ranges: null source_service_accounts: null source_tags: - - nva + - nva target_service_accounts: null target_tags: - - nva + - nva timeouts: null - module.dmz-firewall.google_compute_firewall.custom-rules["dmz-ingress-default-deny"]: - allow: [] + ? module.dmz-firewall.google_compute_firewall.custom-rules["dmz-ingress-default-deny"] + : allow: [] deny: - - ports: [] - protocol: all + - ports: [] + protocol: all description: Deny and log any unmatched ingress traffic. direction: INGRESS disabled: false log_config: - - metadata: EXCLUDE_ALL_METADATA + - metadata: EXCLUDE_ALL_METADATA name: dmz-ingress-default-deny network: prod-dmz-0 priority: 65535 project: fast2-prod-net-landing-0 source_ranges: - - 0.0.0.0/0 + - 0.0.0.0/0 source_service_accounts: null source_tags: null target_service_accounts: null @@ -692,8 +695,8 @@ values: project: fast2-prod-net-landing-0 routing_mode: GLOBAL timeouts: null - module.dmz-vpc.google_compute_subnetwork.subnetwork["europe-west1/dmz-default"]: - description: Default europe-west1 subnet for DMZ + ? module.dmz-vpc.google_compute_subnetwork.subnetwork["europe-west1/dmz-default"] + : description: Default europe-west1 subnet for DMZ ip_cidr_range: 10.64.128.0/24 ipv6_access_type: null log_config: [] @@ -703,10 +706,9 @@ values: project: fast2-prod-net-landing-0 region: europe-west1 role: null - secondary_ip_range: [] timeouts: null - module.dmz-vpc.google_compute_subnetwork.subnetwork["europe-west4/dmz-default"]: - description: Default europe-west4 subnet for DMZ + ? module.dmz-vpc.google_compute_subnetwork.subnetwork["europe-west4/dmz-default"] + : description: Default europe-west4 subnet for DMZ ip_cidr_range: 10.80.128.0/24 ipv6_access_type: null log_config: [] @@ -716,7 +718,6 @@ values: project: fast2-prod-net-landing-0 region: europe-west4 role: null - secondary_ip_range: [] timeouts: null module.dmz-vpc.google_dns_policy.default[0]: alternative_name_server_config: [] @@ -725,117 +726,117 @@ values: enable_logging: true name: prod-dmz-0 networks: - - {} + - {} project: fast2-prod-net-landing-0 timeouts: null module.firewall-policy-default.google_compute_firewall_policy.hierarchical[0]: description: null short_name: net-default timeouts: null - module.firewall-policy-default.google_compute_firewall_policy_rule.hierarchical["ingress/allow-healthchecks"]: - action: allow + ? module.firewall-policy-default.google_compute_firewall_policy_rule.hierarchical["ingress/allow-healthchecks"] + : action: allow description: Enable SSH, HTTP and HTTPS healthchecks direction: INGRESS disabled: false enable_logging: null match: - - dest_address_groups: null - dest_fqdns: null - dest_ip_ranges: null - dest_region_codes: null - dest_threat_intelligences: null - layer4_configs: - - ip_protocol: tcp - ports: - - '22' - - '80' - - '443' - src_address_groups: null - src_fqdns: null - src_ip_ranges: - - 35.191.0.0/16 - - 130.211.0.0/22 - - 209.85.152.0/22 - - 209.85.204.0/22 - src_region_codes: null - src_threat_intelligences: null + - dest_address_groups: null + dest_fqdns: null + dest_ip_ranges: null + dest_region_codes: null + dest_threat_intelligences: null + layer4_configs: + - ip_protocol: tcp + ports: + - "22" + - "80" + - "443" + src_address_groups: null + src_fqdns: null + src_ip_ranges: + - 35.191.0.0/16 + - 130.211.0.0/22 + - 209.85.152.0/22 + - 209.85.204.0/22 + src_region_codes: null + src_threat_intelligences: null priority: 1001 target_resources: null target_service_accounts: null timeouts: null - module.firewall-policy-default.google_compute_firewall_policy_rule.hierarchical["ingress/allow-icmp"]: - action: allow + ? module.firewall-policy-default.google_compute_firewall_policy_rule.hierarchical["ingress/allow-icmp"] + : action: allow description: Enable ICMP direction: INGRESS disabled: false enable_logging: null match: - - dest_address_groups: null - dest_fqdns: null - dest_ip_ranges: null - dest_region_codes: null - dest_threat_intelligences: null - layer4_configs: - - ip_protocol: icmp - ports: [] - src_address_groups: null - src_fqdns: null - src_ip_ranges: - - 0.0.0.0/0 - src_region_codes: null - src_threat_intelligences: null + - dest_address_groups: null + dest_fqdns: null + dest_ip_ranges: null + dest_region_codes: null + dest_threat_intelligences: null + layer4_configs: + - ip_protocol: icmp + ports: [] + src_address_groups: null + src_fqdns: null + src_ip_ranges: + - 0.0.0.0/0 + src_region_codes: null + src_threat_intelligences: null priority: 1003 target_resources: null target_service_accounts: null timeouts: null - module.firewall-policy-default.google_compute_firewall_policy_rule.hierarchical["ingress/allow-nat-ranges"]: - action: allow + ? module.firewall-policy-default.google_compute_firewall_policy_rule.hierarchical["ingress/allow-nat-ranges"] + : action: allow description: Enable NAT ranges for VPC serverless connector direction: INGRESS disabled: false enable_logging: null match: - - dest_address_groups: null - dest_fqdns: null - dest_ip_ranges: null - dest_region_codes: null - dest_threat_intelligences: null - layer4_configs: - - ip_protocol: all - ports: null - src_address_groups: null - src_fqdns: null - src_ip_ranges: - - 107.178.230.64/26 - - 35.199.224.0/19 - src_region_codes: null - src_threat_intelligences: null + - dest_address_groups: null + dest_fqdns: null + dest_ip_ranges: null + dest_region_codes: null + dest_threat_intelligences: null + layer4_configs: + - ip_protocol: all + ports: null + src_address_groups: null + src_fqdns: null + src_ip_ranges: + - 107.178.230.64/26 + - 35.199.224.0/19 + src_region_codes: null + src_threat_intelligences: null priority: 1004 target_resources: null target_service_accounts: null timeouts: null - module.firewall-policy-default.google_compute_firewall_policy_rule.hierarchical["ingress/allow-ssh-from-iap"]: - action: allow + ? module.firewall-policy-default.google_compute_firewall_policy_rule.hierarchical["ingress/allow-ssh-from-iap"] + : action: allow description: Enable SSH from IAP direction: INGRESS disabled: false enable_logging: true match: - - dest_address_groups: null - dest_fqdns: null - dest_ip_ranges: null - dest_region_codes: null - dest_threat_intelligences: null - layer4_configs: - - ip_protocol: tcp - ports: - - '22' - src_address_groups: null - src_fqdns: null - src_ip_ranges: - - 35.235.240.0/20 - src_region_codes: null - src_threat_intelligences: null + - dest_address_groups: null + dest_fqdns: null + dest_ip_ranges: null + dest_region_codes: null + dest_threat_intelligences: null + layer4_configs: + - ip_protocol: tcp + ports: + - "22" + src_address_groups: null + src_fqdns: null + src_ip_ranges: + - 35.235.240.0/20 + src_region_codes: null + src_threat_intelligences: null priority: 1002 target_resources: null target_service_accounts: null @@ -843,27 +844,27 @@ values: module.folder.google_compute_firewall_policy_association.default[0]: name: default timeouts: null - module.folder.google_essential_contacts_contact.contact["gcp-network-admins@fast.example.com"]: - email: gcp-network-admins@fast.example.com + ? module.folder.google_essential_contacts_contact.contact["gcp-network-admins@fast.example.com"] + : email: gcp-network-admins@fast.example.com language_tag: en notification_category_subscriptions: - - ALL + - ALL timeouts: null module.folder.google_folder.folder[0]: display_name: Networking parent: organizations/123456789012 timeouts: null - module.landing-dns-fwd-onprem-example[0].google_dns_managed_zone.dns_managed_zone[0]: - cloud_logging_config: - - enable_logging: false + ? module.landing-dns-fwd-onprem-example[0].google_dns_managed_zone.dns_managed_zone[0] + : cloud_logging_config: + - enable_logging: false description: Terraform managed. dns_name: onprem.example.com. dnssec_config: [] force_destroy: false forwarding_config: - - target_name_servers: - - forwarding_path: '' - ipv4_address: 10.10.10.10 + - target_name_servers: + - forwarding_path: "" + ipv4_address: 10.10.10.10 labels: null name: example-com peering_config: [] @@ -872,17 +873,17 @@ values: service_directory_config: [] timeouts: null visibility: private - module.landing-dns-fwd-onprem-rev-10[0].google_dns_managed_zone.dns_managed_zone[0]: - cloud_logging_config: - - enable_logging: false + ? module.landing-dns-fwd-onprem-rev-10[0].google_dns_managed_zone.dns_managed_zone[0] + : cloud_logging_config: + - enable_logging: false description: Terraform managed. dns_name: 10.in-addr.arpa. dnssec_config: [] force_destroy: false forwarding_config: - - target_name_servers: - - forwarding_path: '' - ipv4_address: 10.10.10.10 + - target_name_servers: + - forwarding_path: "" + ipv4_address: 10.10.10.10 labels: null name: root-reverse-10 peering_config: [] @@ -895,496 +896,496 @@ values: description: Terraform managed. gke_clusters: [] networks: - - {} - - {} + - {} + - {} project: fast2-prod-net-landing-0 response_policy_name: googleapis timeouts: null - module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["accounts"]: - behavior: null + ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["accounts"] + : behavior: null dns_name: accounts.google.com. local_data: - - local_datas: - - name: accounts.google.com. - rrdatas: - - private.googleapis.com. - ttl: null - type: CNAME + - local_datas: + - name: accounts.google.com. + rrdatas: + - private.googleapis.com. + ttl: null + type: CNAME project: fast2-prod-net-landing-0 response_policy: googleapis rule_name: accounts timeouts: null - module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["backupdr-cloud"]: - behavior: null + ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["backupdr-cloud"] + : behavior: null dns_name: backupdr.cloud.google.com. local_data: - - local_datas: - - name: backupdr.cloud.google.com. - rrdatas: - - private.googleapis.com. - ttl: null - type: CNAME + - local_datas: + - name: backupdr.cloud.google.com. + rrdatas: + - private.googleapis.com. + ttl: null + type: CNAME project: fast2-prod-net-landing-0 response_policy: googleapis rule_name: backupdr-cloud timeouts: null - module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["backupdr-cloud-all"]: - behavior: null - dns_name: '*.backupdr.cloud.google.com.' + ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["backupdr-cloud-all"] + : behavior: null + dns_name: "*.backupdr.cloud.google.com." local_data: - - local_datas: - - name: '*.backupdr.cloud.google.com.' - rrdatas: - - private.googleapis.com. - ttl: null - type: CNAME + - local_datas: + - name: "*.backupdr.cloud.google.com." + rrdatas: + - private.googleapis.com. + ttl: null + type: CNAME project: fast2-prod-net-landing-0 response_policy: googleapis rule_name: backupdr-cloud-all timeouts: null - module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["backupdr-gu"]: - behavior: null + ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["backupdr-gu"] + : behavior: null dns_name: backupdr.googleusercontent.google.com. local_data: - - local_datas: - - name: backupdr.googleusercontent.google.com. - rrdatas: - - private.googleapis.com. - ttl: null - type: CNAME + - local_datas: + - name: backupdr.googleusercontent.google.com. + rrdatas: + - private.googleapis.com. + ttl: null + type: CNAME project: fast2-prod-net-landing-0 response_policy: googleapis rule_name: backupdr-gu timeouts: null - module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["backupdr-gu-all"]: - behavior: null - dns_name: '*.backupdr.googleusercontent.google.com.' + ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["backupdr-gu-all"] + : behavior: null + dns_name: "*.backupdr.googleusercontent.google.com." local_data: - - local_datas: - - name: '*.backupdr.googleusercontent.google.com.' - rrdatas: - - private.googleapis.com. - ttl: null - type: CNAME + - local_datas: + - name: "*.backupdr.googleusercontent.google.com." + rrdatas: + - private.googleapis.com. + ttl: null + type: CNAME project: fast2-prod-net-landing-0 response_policy: googleapis rule_name: backupdr-gu-all timeouts: null - module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["cloudfunctions"]: - behavior: null - dns_name: '*.cloudfunctions.net.' + ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["cloudfunctions"] + : behavior: null + dns_name: "*.cloudfunctions.net." local_data: - - local_datas: - - name: '*.cloudfunctions.net.' - rrdatas: - - private.googleapis.com. - ttl: null - type: CNAME + - local_datas: + - name: "*.cloudfunctions.net." + rrdatas: + - private.googleapis.com. + ttl: null + type: CNAME project: fast2-prod-net-landing-0 response_policy: googleapis rule_name: cloudfunctions timeouts: null - module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["cloudproxy"]: - behavior: null - dns_name: '*.cloudproxy.app.' + ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["cloudproxy"] + : behavior: null + dns_name: "*.cloudproxy.app." local_data: - - local_datas: - - name: '*.cloudproxy.app.' - rrdatas: - - private.googleapis.com. - ttl: null - type: CNAME + - local_datas: + - name: "*.cloudproxy.app." + rrdatas: + - private.googleapis.com. + ttl: null + type: CNAME project: fast2-prod-net-landing-0 response_policy: googleapis rule_name: cloudproxy timeouts: null - module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["composer-cloud-all"]: - behavior: null - dns_name: '*.composer.cloud.google.com.' + ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["composer-cloud-all"] + : behavior: null + dns_name: "*.composer.cloud.google.com." local_data: - - local_datas: - - name: '*.composer.cloud.google.com.' - rrdatas: - - private.googleapis.com. - ttl: null - type: CNAME + - local_datas: + - name: "*.composer.cloud.google.com." + rrdatas: + - private.googleapis.com. + ttl: null + type: CNAME project: fast2-prod-net-landing-0 response_policy: googleapis rule_name: composer-cloud-all timeouts: null - module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["composer-gu-all"]: - behavior: null - dns_name: '*.composer.googleusercontent.com.' + ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["composer-gu-all"] + : behavior: null + dns_name: "*.composer.googleusercontent.com." local_data: - - local_datas: - - name: '*.composer.googleusercontent.com.' - rrdatas: - - private.googleapis.com. - ttl: null - type: CNAME + - local_datas: + - name: "*.composer.googleusercontent.com." + rrdatas: + - private.googleapis.com. + ttl: null + type: CNAME project: fast2-prod-net-landing-0 response_policy: googleapis rule_name: composer-gu-all timeouts: null - module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["datafusion-all"]: - behavior: null - dns_name: '*.datafusion.cloud.google.com.' + ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["datafusion-all"] + : behavior: null + dns_name: "*.datafusion.cloud.google.com." local_data: - - local_datas: - - name: '*.datafusion.cloud.google.com.' - rrdatas: - - private.googleapis.com. - ttl: null - type: CNAME + - local_datas: + - name: "*.datafusion.cloud.google.com." + rrdatas: + - private.googleapis.com. + ttl: null + type: CNAME project: fast2-prod-net-landing-0 response_policy: googleapis rule_name: datafusion-all timeouts: null - module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["datafusion-gu-all"]: - behavior: null - dns_name: '*.datafusion.googleusercontent.com.' + ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["datafusion-gu-all"] + : behavior: null + dns_name: "*.datafusion.googleusercontent.com." local_data: - - local_datas: - - name: '*.datafusion.googleusercontent.com.' - rrdatas: - - private.googleapis.com. - ttl: null - type: CNAME + - local_datas: + - name: "*.datafusion.googleusercontent.com." + rrdatas: + - private.googleapis.com. + ttl: null + type: CNAME project: fast2-prod-net-landing-0 response_policy: googleapis rule_name: datafusion-gu-all timeouts: null - module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["dataproc"]: - behavior: null + ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["dataproc"] + : behavior: null dns_name: dataproc.cloud.google.com. local_data: - - local_datas: - - name: dataproc.cloud.google.com. - rrdatas: - - private.googleapis.com. - ttl: null - type: CNAME + - local_datas: + - name: dataproc.cloud.google.com. + rrdatas: + - private.googleapis.com. + ttl: null + type: CNAME project: fast2-prod-net-landing-0 response_policy: googleapis rule_name: dataproc timeouts: null - module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["dataproc-all"]: - behavior: null - dns_name: '*.dataproc.cloud.google.com.' + ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["dataproc-all"] + : behavior: null + dns_name: "*.dataproc.cloud.google.com." local_data: - - local_datas: - - name: '*.dataproc.cloud.google.com.' - rrdatas: - - private.googleapis.com. - ttl: null - type: CNAME + - local_datas: + - name: "*.dataproc.cloud.google.com." + rrdatas: + - private.googleapis.com. + ttl: null + type: CNAME project: fast2-prod-net-landing-0 response_policy: googleapis rule_name: dataproc-all timeouts: null - module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["dataproc-gu"]: - behavior: null + ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["dataproc-gu"] + : behavior: null dns_name: dataproc.googleusercontent.com. local_data: - - local_datas: - - name: dataproc.googleusercontent.com. - rrdatas: - - private.googleapis.com. - ttl: null - type: CNAME + - local_datas: + - name: dataproc.googleusercontent.com. + rrdatas: + - private.googleapis.com. + ttl: null + type: CNAME project: fast2-prod-net-landing-0 response_policy: googleapis rule_name: dataproc-gu timeouts: null - module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["dataproc-gu-all"]: - behavior: null - dns_name: '*.dataproc.googleusercontent.com.' + ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["dataproc-gu-all"] + : behavior: null + dns_name: "*.dataproc.googleusercontent.com." local_data: - - local_datas: - - name: '*.dataproc.googleusercontent.com.' - rrdatas: - - private.googleapis.com. - ttl: null - type: CNAME + - local_datas: + - name: "*.dataproc.googleusercontent.com." + rrdatas: + - private.googleapis.com. + ttl: null + type: CNAME project: fast2-prod-net-landing-0 response_policy: googleapis rule_name: dataproc-gu-all timeouts: null - module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["dl"]: - behavior: null + ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["dl"] + : behavior: null dns_name: dl.google.com. local_data: - - local_datas: - - name: dl.google.com. - rrdatas: - - private.googleapis.com. - ttl: null - type: CNAME + - local_datas: + - name: dl.google.com. + rrdatas: + - private.googleapis.com. + ttl: null + type: CNAME project: fast2-prod-net-landing-0 response_policy: googleapis rule_name: dl timeouts: null - module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["gcr"]: - behavior: null + ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["gcr"] + : behavior: null dns_name: gcr.io. local_data: - - local_datas: - - name: gcr.io. - rrdatas: - - private.googleapis.com. - ttl: null - type: CNAME + - local_datas: + - name: gcr.io. + rrdatas: + - private.googleapis.com. + ttl: null + type: CNAME project: fast2-prod-net-landing-0 response_policy: googleapis rule_name: gcr timeouts: null - module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["gcr-all"]: - behavior: null - dns_name: '*.gcr.io.' + ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["gcr-all"] + : behavior: null + dns_name: "*.gcr.io." local_data: - - local_datas: - - name: '*.gcr.io.' - rrdatas: - - private.googleapis.com. - ttl: null - type: CNAME + - local_datas: + - name: "*.gcr.io." + rrdatas: + - private.googleapis.com. + ttl: null + type: CNAME project: fast2-prod-net-landing-0 response_policy: googleapis rule_name: gcr-all timeouts: null - module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["googleapis-all"]: - behavior: null - dns_name: '*.googleapis.com.' + ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["googleapis-all"] + : behavior: null + dns_name: "*.googleapis.com." local_data: - - local_datas: - - name: '*.googleapis.com.' - rrdatas: - - private.googleapis.com. - ttl: null - type: CNAME + - local_datas: + - name: "*.googleapis.com." + rrdatas: + - private.googleapis.com. + ttl: null + type: CNAME project: fast2-prod-net-landing-0 response_policy: googleapis rule_name: googleapis-all timeouts: null - module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["googleapis-private"]: - behavior: null + ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["googleapis-private"] + : behavior: null dns_name: private.googleapis.com. local_data: - - local_datas: - - name: private.googleapis.com. - rrdatas: - - 199.36.153.8 - - 199.36.153.9 - - 199.36.153.10 - - 199.36.153.11 - ttl: null - type: A + - local_datas: + - name: private.googleapis.com. + rrdatas: + - 199.36.153.8 + - 199.36.153.9 + - 199.36.153.10 + - 199.36.153.11 + ttl: null + type: A project: fast2-prod-net-landing-0 response_policy: googleapis rule_name: googleapis-private timeouts: null - module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["googleapis-restricted"]: - behavior: null + ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["googleapis-restricted"] + : behavior: null dns_name: restricted.googleapis.com. local_data: - - local_datas: - - name: restricted.googleapis.com. - rrdatas: - - 199.36.153.4 - - 199.36.153.5 - - 199.36.153.6 - - 199.36.153.7 - ttl: null - type: A + - local_datas: + - name: restricted.googleapis.com. + rrdatas: + - 199.36.153.4 + - 199.36.153.5 + - 199.36.153.6 + - 199.36.153.7 + ttl: null + type: A project: fast2-prod-net-landing-0 response_policy: googleapis rule_name: googleapis-restricted timeouts: null - module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["gstatic-all"]: - behavior: null - dns_name: '*.gstatic.com.' + ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["gstatic-all"] + : behavior: null + dns_name: "*.gstatic.com." local_data: - - local_datas: - - name: '*.gstatic.com.' - rrdatas: - - private.googleapis.com. - ttl: null - type: CNAME + - local_datas: + - name: "*.gstatic.com." + rrdatas: + - private.googleapis.com. + ttl: null + type: CNAME project: fast2-prod-net-landing-0 response_policy: googleapis rule_name: gstatic-all timeouts: null - module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["kernels-gu"]: - behavior: null + ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["kernels-gu"] + : behavior: null dns_name: kernels.googleusercontent.com. local_data: - - local_datas: - - name: kernels.googleusercontent.com. - rrdatas: - - private.googleapis.com. - ttl: null - type: CNAME + - local_datas: + - name: kernels.googleusercontent.com. + rrdatas: + - private.googleapis.com. + ttl: null + type: CNAME project: fast2-prod-net-landing-0 response_policy: googleapis rule_name: kernels-gu timeouts: null - module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["kernels-gu-all"]: - behavior: null - dns_name: '*.kernels.googleusercontent.com.' + ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["kernels-gu-all"] + : behavior: null + dns_name: "*.kernels.googleusercontent.com." local_data: - - local_datas: - - name: '*.kernels.googleusercontent.com.' - rrdatas: - - private.googleapis.com. - ttl: null - type: CNAME + - local_datas: + - name: "*.kernels.googleusercontent.com." + rrdatas: + - private.googleapis.com. + ttl: null + type: CNAME project: fast2-prod-net-landing-0 response_policy: googleapis rule_name: kernels-gu-all timeouts: null - module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["notebooks-all"]: - behavior: null - dns_name: '*.notebooks.cloud.google.com.' + ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["notebooks-all"] + : behavior: null + dns_name: "*.notebooks.cloud.google.com." local_data: - - local_datas: - - name: '*.notebooks.cloud.google.com.' - rrdatas: - - private.googleapis.com. - ttl: null - type: CNAME + - local_datas: + - name: "*.notebooks.cloud.google.com." + rrdatas: + - private.googleapis.com. + ttl: null + type: CNAME project: fast2-prod-net-landing-0 response_policy: googleapis rule_name: notebooks-all timeouts: null - module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["notebooks-gu-all"]: - behavior: null - dns_name: '*.notebooks.googleusercontent.com.' + ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["notebooks-gu-all"] + : behavior: null + dns_name: "*.notebooks.googleusercontent.com." local_data: - - local_datas: - - name: '*.notebooks.googleusercontent.com.' - rrdatas: - - private.googleapis.com. - ttl: null - type: CNAME + - local_datas: + - name: "*.notebooks.googleusercontent.com." + rrdatas: + - private.googleapis.com. + ttl: null + type: CNAME project: fast2-prod-net-landing-0 response_policy: googleapis rule_name: notebooks-gu-all timeouts: null - module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["packages-cloud"]: - behavior: null + ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["packages-cloud"] + : behavior: null dns_name: packages.cloud.google.com. local_data: - - local_datas: - - name: packages.cloud.google.com. - rrdatas: - - private.googleapis.com. - ttl: null - type: CNAME + - local_datas: + - name: packages.cloud.google.com. + rrdatas: + - private.googleapis.com. + ttl: null + type: CNAME project: fast2-prod-net-landing-0 response_policy: googleapis rule_name: packages-cloud timeouts: null - module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["packages-cloud-all"]: - behavior: null - dns_name: '*.packages.cloud.google.com.' + ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["packages-cloud-all"] + : behavior: null + dns_name: "*.packages.cloud.google.com." local_data: - - local_datas: - - name: '*.packages.cloud.google.com.' - rrdatas: - - private.googleapis.com. - ttl: null - type: CNAME + - local_datas: + - name: "*.packages.cloud.google.com." + rrdatas: + - private.googleapis.com. + ttl: null + type: CNAME project: fast2-prod-net-landing-0 response_policy: googleapis rule_name: packages-cloud-all timeouts: null - module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["pkgdev"]: - behavior: null + ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["pkgdev"] + : behavior: null dns_name: pkg.dev. local_data: - - local_datas: - - name: pkg.dev. - rrdatas: - - private.googleapis.com. - ttl: null - type: CNAME + - local_datas: + - name: pkg.dev. + rrdatas: + - private.googleapis.com. + ttl: null + type: CNAME project: fast2-prod-net-landing-0 response_policy: googleapis rule_name: pkgdev timeouts: null - module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["pkgdev-all"]: - behavior: null - dns_name: '*.pkg.dev.' + ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["pkgdev-all"] + : behavior: null + dns_name: "*.pkg.dev." local_data: - - local_datas: - - name: '*.pkg.dev.' - rrdatas: - - private.googleapis.com. - ttl: null - type: CNAME + - local_datas: + - name: "*.pkg.dev." + rrdatas: + - private.googleapis.com. + ttl: null + type: CNAME project: fast2-prod-net-landing-0 response_policy: googleapis rule_name: pkgdev-all timeouts: null - module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["pkigoog"]: - behavior: null + ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["pkigoog"] + : behavior: null dns_name: pki.goog. local_data: - - local_datas: - - name: pki.goog. - rrdatas: - - private.googleapis.com. - ttl: null - type: CNAME + - local_datas: + - name: pki.goog. + rrdatas: + - private.googleapis.com. + ttl: null + type: CNAME project: fast2-prod-net-landing-0 response_policy: googleapis rule_name: pkigoog timeouts: null - module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["pkigoog-all"]: - behavior: null - dns_name: '*.pki.goog.' + ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["pkigoog-all"] + : behavior: null + dns_name: "*.pki.goog." local_data: - - local_datas: - - name: '*.pki.goog.' - rrdatas: - - private.googleapis.com. - ttl: null - type: CNAME + - local_datas: + - name: "*.pki.goog." + rrdatas: + - private.googleapis.com. + ttl: null + type: CNAME project: fast2-prod-net-landing-0 response_policy: googleapis rule_name: pkigoog-all timeouts: null - module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["run-all"]: - behavior: null - dns_name: '*.run.app.' + ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["run-all"] + : behavior: null + dns_name: "*.run.app." local_data: - - local_datas: - - name: '*.run.app.' - rrdatas: - - private.googleapis.com. - ttl: null - type: CNAME + - local_datas: + - name: "*.run.app." + rrdatas: + - private.googleapis.com. + ttl: null + type: CNAME project: fast2-prod-net-landing-0 response_policy: googleapis rule_name: run-all timeouts: null - module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["source"]: - behavior: null + ? module.landing-dns-policy-googleapis.google_dns_response_policy_rule.default["source"] + : behavior: null dns_name: source.developers.google.com. local_data: - - local_datas: - - name: source.developers.google.com. - rrdatas: - - private.googleapis.com. - ttl: null - type: CNAME + - local_datas: + - name: source.developers.google.com. + rrdatas: + - private.googleapis.com. + ttl: null + type: CNAME project: fast2-prod-net-landing-0 response_policy: googleapis rule_name: source timeouts: null module.landing-dns-priv-gcp.google_dns_managed_zone.dns_managed_zone[0]: cloud_logging_config: - - enable_logging: false + - enable_logging: false description: Terraform managed. dns_name: gcp.example.com. dnssec_config: [] @@ -1397,20 +1398,20 @@ values: service_directory_config: [] timeouts: null visibility: private - module.landing-dns-priv-gcp.google_dns_record_set.dns_record_set["A localhost"]: - managed_zone: gcp-example-com + ? module.landing-dns-priv-gcp.google_dns_record_set.dns_record_set["A localhost"] + : managed_zone: gcp-example-com name: localhost.gcp.example.com. project: fast2-prod-net-landing-0 routing_policy: [] rrdatas: - - 127.0.0.1 + - 127.0.0.1 ttl: 300 type: A - module.landing-firewall.google_compute_firewall.custom-rules["allow-hc-nva-ssh-landing"]: - allow: - - ports: - - '22' - protocol: tcp + ? module.landing-firewall.google_compute_firewall.custom-rules["allow-hc-nva-ssh-landing"] + : allow: + - ports: + - "22" + protocol: tcp deny: [] description: Allow traffic from Google healthchecks to NVA appliances direction: INGRESS @@ -1421,20 +1422,20 @@ values: priority: 1000 project: fast2-prod-net-landing-0 source_ranges: - - 130.211.0.0/22 - - 209.85.152.0/22 - - 209.85.204.0/22 - - 35.191.0.0/16 + - 130.211.0.0/22 + - 209.85.152.0/22 + - 209.85.204.0/22 + - 35.191.0.0/16 source_service_accounts: null source_tags: null target_service_accounts: null target_tags: null timeouts: null - module.landing-firewall.google_compute_firewall.custom-rules["allow-ncc-nva-bgp-landing"]: - allow: - - ports: - - '179' - protocol: tcp + ? module.landing-firewall.google_compute_firewall.custom-rules["allow-ncc-nva-bgp-landing"] + : allow: + - ports: + - "179" + protocol: tcp deny: [] description: Allow BGP traffic from NCC Cloud Routers to NVAs direction: INGRESS @@ -1445,21 +1446,21 @@ values: priority: 1000 project: fast2-prod-net-landing-0 source_ranges: - - 10.128.64.201/32 - - 10.128.64.202/32 - - 10.128.96.201/32 - - 10.128.96.202/32 + - 10.128.64.201/32 + - 10.128.64.202/32 + - 10.128.96.201/32 + - 10.128.96.202/32 source_service_accounts: null source_tags: null target_service_accounts: null target_tags: - - nva + - nva timeouts: null - module.landing-firewall.google_compute_firewall.custom-rules["allow-onprem-probes-landing-example"]: - allow: - - ports: - - '12345' - protocol: tcp + ? module.landing-firewall.google_compute_firewall.custom-rules["allow-onprem-probes-landing-example"] + : allow: + - ports: + - "12345" + protocol: tcp deny: [] description: Allow traffic from onprem probes direction: INGRESS @@ -1470,28 +1471,28 @@ values: priority: 1000 project: fast2-prod-net-landing-0 source_ranges: - - 10.255.255.254/32 + - 10.255.255.254/32 source_service_accounts: null source_tags: null target_service_accounts: null target_tags: null timeouts: null - module.landing-firewall.google_compute_firewall.custom-rules["landing-ingress-default-deny"]: - allow: [] + ? module.landing-firewall.google_compute_firewall.custom-rules["landing-ingress-default-deny"] + : allow: [] deny: - - ports: [] - protocol: all + - ports: [] + protocol: all description: Deny and log any unmatched ingress traffic. direction: INGRESS disabled: false log_config: - - metadata: EXCLUDE_ALL_METADATA + - metadata: EXCLUDE_ALL_METADATA name: landing-ingress-default-deny network: prod-landing-0 priority: 65535 project: fast2-prod-net-landing-0 source_ranges: - - 0.0.0.0/0 + - 0.0.0.0/0 source_service_accounts: null source_tags: null target_service_accounts: null @@ -1512,8 +1513,8 @@ values: enable_endpoint_independent_mapping: true icmp_idle_timeout_sec: 30 log_config: - - enable: false - filter: ALL + - enable: false + filter: ALL max_ports_per_vm: null name: ew1 nat_ip_allocate_option: AUTO_ONLY @@ -1545,8 +1546,8 @@ values: enable_endpoint_independent_mapping: true icmp_idle_timeout_sec: 30 log_config: - - enable: false - filter: ALL + - enable: false + filter: ALL max_ports_per_vm: null name: ew4 nat_ip_allocate_option: AUTO_ONLY @@ -1563,8 +1564,8 @@ values: timeouts: null type: PUBLIC udp_idle_timeout_sec: 30 - module.landing-project.google_compute_shared_vpc_host_project.shared_vpc_host[0]: - project: fast2-prod-net-landing-0 + ? module.landing-project.google_compute_shared_vpc_host_project.shared_vpc_host[0] + : project: fast2-prod-net-landing-0 timeouts: null module.landing-project.google_project.project[0]: auto_create_network: false @@ -1576,70 +1577,70 @@ values: project_id: fast2-prod-net-landing-0 skip_delete: false timeouts: null - module.landing-project.google_project_iam_binding.authoritative["organizations/123456789012/roles/foo"]: - condition: [] + ? module.landing-project.google_project_iam_binding.authoritative["organizations/123456789012/roles/foo"] + : condition: [] members: - - serviceAccount:string + - serviceAccount:string project: fast2-prod-net-landing-0 role: organizations/123456789012/roles/foo - module.landing-project.google_project_iam_binding.authoritative["roles/dns.admin"]: - condition: [] + ? module.landing-project.google_project_iam_binding.authoritative["roles/dns.admin"] + : condition: [] members: - - serviceAccount:string + - serviceAccount:string project: fast2-prod-net-landing-0 role: roles/dns.admin - module.landing-project.google_project_service.project_services["compute.googleapis.com"]: - disable_dependent_services: false + ? module.landing-project.google_project_service.project_services["compute.googleapis.com"] + : disable_dependent_services: false disable_on_destroy: false project: fast2-prod-net-landing-0 service: compute.googleapis.com timeouts: null - module.landing-project.google_project_service.project_services["dns.googleapis.com"]: - disable_dependent_services: false + ? module.landing-project.google_project_service.project_services["dns.googleapis.com"] + : disable_dependent_services: false disable_on_destroy: false project: fast2-prod-net-landing-0 service: dns.googleapis.com timeouts: null - module.landing-project.google_project_service.project_services["iap.googleapis.com"]: - disable_dependent_services: false + ? module.landing-project.google_project_service.project_services["iap.googleapis.com"] + : disable_dependent_services: false disable_on_destroy: false project: fast2-prod-net-landing-0 service: iap.googleapis.com timeouts: null - module.landing-project.google_project_service.project_services["networkconnectivity.googleapis.com"]: - disable_dependent_services: false + ? module.landing-project.google_project_service.project_services["networkconnectivity.googleapis.com"] + : disable_dependent_services: false disable_on_destroy: false project: fast2-prod-net-landing-0 service: networkconnectivity.googleapis.com timeouts: null - module.landing-project.google_project_service.project_services["networkmanagement.googleapis.com"]: - disable_dependent_services: false + ? module.landing-project.google_project_service.project_services["networkmanagement.googleapis.com"] + : disable_dependent_services: false disable_on_destroy: false project: fast2-prod-net-landing-0 service: networkmanagement.googleapis.com timeouts: null - module.landing-project.google_project_service.project_services["stackdriver.googleapis.com"]: - disable_dependent_services: false + ? module.landing-project.google_project_service.project_services["stackdriver.googleapis.com"] + : disable_dependent_services: false disable_on_destroy: false project: fast2-prod-net-landing-0 service: stackdriver.googleapis.com timeouts: null - module.landing-project.google_project_service_identity.jit_si["iap.googleapis.com"]: - project: fast2-prod-net-landing-0 + ? module.landing-project.google_project_service_identity.jit_si["iap.googleapis.com"] + : project: fast2-prod-net-landing-0 service: iap.googleapis.com timeouts: null - module.landing-to-onprem-primary-vpn[0].google_compute_external_vpn_gateway.external_gateway["default"]: - description: Terraform managed external VPN gateway + ? module.landing-to-onprem-primary-vpn[0].google_compute_external_vpn_gateway.external_gateway["default"] + : description: Terraform managed external VPN gateway interface: - - id: 0 - ip_address: 8.8.8.8 + - id: 0 + ip_address: 8.8.8.8 labels: null name: vpn-to-onprem-ew1-default project: fast2-prod-net-landing-0 redundancy_type: SINGLE_IP_INTERNALLY_REDUNDANT timeouts: null - module.landing-to-onprem-primary-vpn[0].google_compute_ha_vpn_gateway.ha_gateway[0]: - description: Terraform managed external VPN gateway + ? module.landing-to-onprem-primary-vpn[0].google_compute_ha_vpn_gateway.ha_gateway[0] + : description: Terraform managed external VPN gateway name: vpn-to-onprem-ew1 project: fast2-prod-net-landing-0 region: europe-west1 @@ -1647,25 +1648,25 @@ values: timeouts: null module.landing-to-onprem-primary-vpn[0].google_compute_router.router[0]: bgp: - - advertise_mode: CUSTOM - advertised_groups: [] - advertised_ip_ranges: - - description: gcp - range: 10.1.0.0/16 - - description: gcp-restricted - range: 199.36.153.4/30 - - description: gcp-dns - range: 35.199.192.0/19 - asn: 65501 - keepalive_interval: 20 + - advertise_mode: CUSTOM + advertised_groups: [] + advertised_ip_ranges: + - description: gcp + range: 10.1.0.0/16 + - description: gcp-restricted + range: 199.36.153.4/30 + - description: gcp-dns + range: 35.199.192.0/19 + asn: 65501 + keepalive_interval: 20 description: null encrypted_interconnect_router: null name: vpn-vpn-to-onprem-ew1 project: fast2-prod-net-landing-0 region: europe-west1 timeouts: null - module.landing-to-onprem-primary-vpn[0].google_compute_router_interface.router_interface["0"]: - interconnect_attachment: null + ? module.landing-to-onprem-primary-vpn[0].google_compute_router_interface.router_interface["0"] + : interconnect_attachment: null ip_range: 169.254.1.2/30 name: vpn-to-onprem-ew1-0 private_ip_address: null @@ -1675,8 +1676,8 @@ values: subnetwork: null timeouts: null vpn_tunnel: vpn-to-onprem-ew1-0 - module.landing-to-onprem-primary-vpn[0].google_compute_router_interface.router_interface["1"]: - interconnect_attachment: null + ? module.landing-to-onprem-primary-vpn[0].google_compute_router_interface.router_interface["1"] + : interconnect_attachment: null ip_range: 169.254.2.2/30 name: vpn-to-onprem-ew1-1 private_ip_address: null @@ -1686,8 +1687,8 @@ values: subnetwork: null timeouts: null vpn_tunnel: vpn-to-onprem-ew1-1 - module.landing-to-onprem-primary-vpn[0].google_compute_router_peer.bgp_peer["0"]: - advertise_mode: DEFAULT + ? module.landing-to-onprem-primary-vpn[0].google_compute_router_peer.bgp_peer["0"] + : advertise_mode: DEFAULT advertised_groups: [] advertised_ip_ranges: [] advertised_route_priority: 1000 @@ -1703,8 +1704,8 @@ values: router: vpn-vpn-to-onprem-ew1 router_appliance_instance: null timeouts: null - module.landing-to-onprem-primary-vpn[0].google_compute_router_peer.bgp_peer["1"]: - advertise_mode: DEFAULT + ? module.landing-to-onprem-primary-vpn[0].google_compute_router_peer.bgp_peer["1"] + : advertise_mode: DEFAULT advertised_groups: [] advertised_ip_ranges: [] advertised_route_priority: 1000 @@ -1720,8 +1721,8 @@ values: router: vpn-vpn-to-onprem-ew1 router_appliance_instance: null timeouts: null - module.landing-to-onprem-primary-vpn[0].google_compute_vpn_tunnel.tunnels["0"]: - description: null + ? module.landing-to-onprem-primary-vpn[0].google_compute_vpn_tunnel.tunnels["0"] + : description: null ike_version: 2 labels: null name: vpn-to-onprem-ew1-0 @@ -1734,8 +1735,8 @@ values: target_vpn_gateway: null timeouts: null vpn_gateway_interface: 0 - module.landing-to-onprem-primary-vpn[0].google_compute_vpn_tunnel.tunnels["1"]: - description: null + ? module.landing-to-onprem-primary-vpn[0].google_compute_vpn_tunnel.tunnels["1"] + : description: null ike_version: 2 labels: null name: vpn-to-onprem-ew1-1 @@ -1752,18 +1753,18 @@ values: byte_length: 8 keepers: null prefix: null - module.landing-to-onprem-secondary-vpn[0].google_compute_external_vpn_gateway.external_gateway["default"]: - description: Terraform managed external VPN gateway + ? module.landing-to-onprem-secondary-vpn[0].google_compute_external_vpn_gateway.external_gateway["default"] + : description: Terraform managed external VPN gateway interface: - - id: 0 - ip_address: 8.8.4.4 + - id: 0 + ip_address: 8.8.4.4 labels: null name: vpn-to-onprem-ew4-default project: fast2-prod-net-landing-0 redundancy_type: SINGLE_IP_INTERNALLY_REDUNDANT timeouts: null - module.landing-to-onprem-secondary-vpn[0].google_compute_ha_vpn_gateway.ha_gateway[0]: - description: Terraform managed external VPN gateway + ? module.landing-to-onprem-secondary-vpn[0].google_compute_ha_vpn_gateway.ha_gateway[0] + : description: Terraform managed external VPN gateway name: vpn-to-onprem-ew4 project: fast2-prod-net-landing-0 region: europe-west4 @@ -1771,25 +1772,25 @@ values: timeouts: null module.landing-to-onprem-secondary-vpn[0].google_compute_router.router[0]: bgp: - - advertise_mode: CUSTOM - advertised_groups: [] - advertised_ip_ranges: - - description: gcp - range: 10.1.0.0/16 - - description: gcp-restricted - range: 199.36.153.4/30 - - description: gcp-dns - range: 35.199.192.0/19 - asn: 65501 - keepalive_interval: 20 + - advertise_mode: CUSTOM + advertised_groups: [] + advertised_ip_ranges: + - description: gcp + range: 10.1.0.0/16 + - description: gcp-restricted + range: 199.36.153.4/30 + - description: gcp-dns + range: 35.199.192.0/19 + asn: 65501 + keepalive_interval: 20 description: null encrypted_interconnect_router: null name: vpn-vpn-to-onprem-ew4 project: fast2-prod-net-landing-0 region: europe-west4 timeouts: null - module.landing-to-onprem-secondary-vpn[0].google_compute_router_interface.router_interface["0"]: - interconnect_attachment: null + ? module.landing-to-onprem-secondary-vpn[0].google_compute_router_interface.router_interface["0"] + : interconnect_attachment: null ip_range: 169.254.3.2/30 name: vpn-to-onprem-ew4-0 private_ip_address: null @@ -1799,8 +1800,8 @@ values: subnetwork: null timeouts: null vpn_tunnel: vpn-to-onprem-ew4-0 - module.landing-to-onprem-secondary-vpn[0].google_compute_router_interface.router_interface["1"]: - interconnect_attachment: null + ? module.landing-to-onprem-secondary-vpn[0].google_compute_router_interface.router_interface["1"] + : interconnect_attachment: null ip_range: 169.254.4.2/30 name: vpn-to-onprem-ew4-1 private_ip_address: null @@ -1810,8 +1811,8 @@ values: subnetwork: null timeouts: null vpn_tunnel: vpn-to-onprem-ew4-1 - module.landing-to-onprem-secondary-vpn[0].google_compute_router_peer.bgp_peer["0"]: - advertise_mode: DEFAULT + ? module.landing-to-onprem-secondary-vpn[0].google_compute_router_peer.bgp_peer["0"] + : advertise_mode: DEFAULT advertised_groups: [] advertised_ip_ranges: [] advertised_route_priority: 1000 @@ -1827,8 +1828,8 @@ values: router: vpn-vpn-to-onprem-ew4 router_appliance_instance: null timeouts: null - module.landing-to-onprem-secondary-vpn[0].google_compute_router_peer.bgp_peer["1"]: - advertise_mode: DEFAULT + ? module.landing-to-onprem-secondary-vpn[0].google_compute_router_peer.bgp_peer["1"] + : advertise_mode: DEFAULT advertised_groups: [] advertised_ip_ranges: [] advertised_route_priority: 1000 @@ -1844,8 +1845,8 @@ values: router: vpn-vpn-to-onprem-ew4 router_appliance_instance: null timeouts: null - module.landing-to-onprem-secondary-vpn[0].google_compute_vpn_tunnel.tunnels["0"]: - description: null + ? module.landing-to-onprem-secondary-vpn[0].google_compute_vpn_tunnel.tunnels["0"] + : description: null ike_version: 2 labels: null name: vpn-to-onprem-ew4-0 @@ -1858,8 +1859,8 @@ values: target_vpn_gateway: null timeouts: null vpn_gateway_interface: 0 - module.landing-to-onprem-secondary-vpn[0].google_compute_vpn_tunnel.tunnels["1"]: - description: null + ? module.landing-to-onprem-secondary-vpn[0].google_compute_vpn_tunnel.tunnels["1"] + : description: null ike_version: 2 labels: null name: vpn-to-onprem-ew4-1 @@ -1913,8 +1914,8 @@ values: project: fast2-prod-net-landing-0 tags: null timeouts: null - module.landing-vpc.google_compute_subnetwork.subnetwork["europe-west1/landing-default"]: - description: Default europe-west1 subnet for landing + ? module.landing-vpc.google_compute_subnetwork.subnetwork["europe-west1/landing-default"] + : description: Default europe-west1 subnet for landing ip_cidr_range: 10.64.0.0/24 ipv6_access_type: null log_config: [] @@ -1924,10 +1925,9 @@ values: project: fast2-prod-net-landing-0 region: europe-west1 role: null - secondary_ip_range: [] timeouts: null - module.landing-vpc.google_compute_subnetwork.subnetwork["europe-west4/landing-default"]: - description: Default europe-west4 subnet for landing + ? module.landing-vpc.google_compute_subnetwork.subnetwork["europe-west4/landing-default"] + : description: Default europe-west4 subnet for landing ip_cidr_range: 10.80.0.0/24 ipv6_access_type: null log_config: [] @@ -1937,7 +1937,6 @@ values: project: fast2-prod-net-landing-0 region: europe-west4 role: null - secondary_ip_range: [] timeouts: null module.landing-vpc.google_dns_policy.default[0]: alternative_name_server_config: [] @@ -1946,7 +1945,7 @@ values: enable_logging: null name: prod-landing-0 networks: - - {} + - {} project: fast2-prod-net-landing-0 timeouts: null module.nva["primary-b"].google_compute_instance.default[0]: @@ -1954,15 +1953,15 @@ values: allow_stopping_for_update: true attached_disk: [] boot_disk: - - auto_delete: true - disk_encryption_key_raw: null - initialize_params: - - enable_confidential_compute: null - image: projects/cos-cloud/global/images/family/cos-stable - resource_manager_tags: null - size: 10 - type: pd-balanced - mode: READ_WRITE + - auto_delete: true + disk_encryption_key_raw: null + initialize_params: + - enable_confidential_compute: null + image: projects/cos-cloud/global/images/family/cos-stable + resource_manager_tags: null + size: 10 + type: pd-balanced + mode: READ_WRITE can_ip_forward: true deletion_protection: false description: Managed by the compute-vm Terraform module. @@ -1972,7 +1971,8 @@ values: labels: null machine_type: e2-standard-2 metadata: - user-data: "#cloud-config\n\n# Copyright 2024 Google LLC\n#\n# Licensed under\ + user-data: + "#cloud-config\n\n# Copyright 2024 Google LLC\n#\n# Licensed under\ \ the Apache License, Version 2.0 (the \"License\");\n# you may not use this\ \ file except in compliance with the License.\n# You may obtain a copy of\ \ the License at\n#\n# https://www.apache.org/licenses/LICENSE-2.0\n#\n\ @@ -2159,44 +2159,44 @@ values: metadata_startup_script: null name: nva-ew1-b network_interface: - - access_config: [] - alias_ip_range: [] - ipv6_access_config: [] - network_ip: 10.64.128.101 - nic_type: null - queue_count: null - security_policy: null - - access_config: [] - alias_ip_range: [] - ipv6_access_config: [] - network_ip: 10.64.0.101 - nic_type: null - queue_count: null - security_policy: null + - access_config: [] + alias_ip_range: [] + ipv6_access_config: [] + network_ip: 10.64.128.101 + nic_type: null + queue_count: null + security_policy: null + - access_config: [] + alias_ip_range: [] + ipv6_access_config: [] + network_ip: 10.64.0.101 + nic_type: null + queue_count: null + security_policy: null network_performance_config: [] params: [] project: fast2-prod-net-landing-0 resource_policies: null scheduling: - - automatic_restart: true - instance_termination_action: null - local_ssd_recovery_timeout: [] - maintenance_interval: null - max_run_duration: [] - min_node_cpus: null - node_affinities: [] - on_host_maintenance: MIGRATE - preemptible: false - provisioning_model: STANDARD + - automatic_restart: true + instance_termination_action: null + local_ssd_recovery_timeout: [] + maintenance_interval: null + max_run_duration: [] + min_node_cpus: null + node_affinities: [] + on_host_maintenance: MIGRATE + preemptible: false + provisioning_model: STANDARD scratch_disk: [] service_account: - - scopes: - - https://www.googleapis.com/auth/devstorage.read_only - - https://www.googleapis.com/auth/logging.write - - https://www.googleapis.com/auth/monitoring.write + - scopes: + - https://www.googleapis.com/auth/devstorage.read_only + - https://www.googleapis.com/auth/logging.write + - https://www.googleapis.com/auth/monitoring.write shielded_instance_config: [] tags: - - nva + - nva timeouts: null zone: europe-west1-b module.nva["primary-c"].google_compute_instance.default[0]: @@ -2204,15 +2204,15 @@ values: allow_stopping_for_update: true attached_disk: [] boot_disk: - - auto_delete: true - disk_encryption_key_raw: null - initialize_params: - - enable_confidential_compute: null - image: projects/cos-cloud/global/images/family/cos-stable - resource_manager_tags: null - size: 10 - type: pd-balanced - mode: READ_WRITE + - auto_delete: true + disk_encryption_key_raw: null + initialize_params: + - enable_confidential_compute: null + image: projects/cos-cloud/global/images/family/cos-stable + resource_manager_tags: null + size: 10 + type: pd-balanced + mode: READ_WRITE can_ip_forward: true deletion_protection: false description: Managed by the compute-vm Terraform module. @@ -2222,7 +2222,8 @@ values: labels: null machine_type: e2-standard-2 metadata: - user-data: "#cloud-config\n\n# Copyright 2024 Google LLC\n#\n# Licensed under\ + user-data: + "#cloud-config\n\n# Copyright 2024 Google LLC\n#\n# Licensed under\ \ the Apache License, Version 2.0 (the \"License\");\n# you may not use this\ \ file except in compliance with the License.\n# You may obtain a copy of\ \ the License at\n#\n# https://www.apache.org/licenses/LICENSE-2.0\n#\n\ @@ -2409,44 +2410,44 @@ values: metadata_startup_script: null name: nva-ew1-c network_interface: - - access_config: [] - alias_ip_range: [] - ipv6_access_config: [] - network_ip: 10.64.128.102 - nic_type: null - queue_count: null - security_policy: null - - access_config: [] - alias_ip_range: [] - ipv6_access_config: [] - network_ip: 10.64.0.102 - nic_type: null - queue_count: null - security_policy: null + - access_config: [] + alias_ip_range: [] + ipv6_access_config: [] + network_ip: 10.64.128.102 + nic_type: null + queue_count: null + security_policy: null + - access_config: [] + alias_ip_range: [] + ipv6_access_config: [] + network_ip: 10.64.0.102 + nic_type: null + queue_count: null + security_policy: null network_performance_config: [] params: [] project: fast2-prod-net-landing-0 resource_policies: null scheduling: - - automatic_restart: true - instance_termination_action: null - local_ssd_recovery_timeout: [] - maintenance_interval: null - max_run_duration: [] - min_node_cpus: null - node_affinities: [] - on_host_maintenance: MIGRATE - preemptible: false - provisioning_model: STANDARD + - automatic_restart: true + instance_termination_action: null + local_ssd_recovery_timeout: [] + maintenance_interval: null + max_run_duration: [] + min_node_cpus: null + node_affinities: [] + on_host_maintenance: MIGRATE + preemptible: false + provisioning_model: STANDARD scratch_disk: [] service_account: - - scopes: - - https://www.googleapis.com/auth/devstorage.read_only - - https://www.googleapis.com/auth/logging.write - - https://www.googleapis.com/auth/monitoring.write + - scopes: + - https://www.googleapis.com/auth/devstorage.read_only + - https://www.googleapis.com/auth/logging.write + - https://www.googleapis.com/auth/monitoring.write shielded_instance_config: [] tags: - - nva + - nva timeouts: null zone: europe-west1-c module.nva["secondary-b"].google_compute_instance.default[0]: @@ -2454,15 +2455,15 @@ values: allow_stopping_for_update: true attached_disk: [] boot_disk: - - auto_delete: true - disk_encryption_key_raw: null - initialize_params: - - enable_confidential_compute: null - image: projects/cos-cloud/global/images/family/cos-stable - resource_manager_tags: null - size: 10 - type: pd-balanced - mode: READ_WRITE + - auto_delete: true + disk_encryption_key_raw: null + initialize_params: + - enable_confidential_compute: null + image: projects/cos-cloud/global/images/family/cos-stable + resource_manager_tags: null + size: 10 + type: pd-balanced + mode: READ_WRITE can_ip_forward: true deletion_protection: false description: Managed by the compute-vm Terraform module. @@ -2472,7 +2473,8 @@ values: labels: null machine_type: e2-standard-2 metadata: - user-data: "#cloud-config\n\n# Copyright 2024 Google LLC\n#\n# Licensed under\ + user-data: + "#cloud-config\n\n# Copyright 2024 Google LLC\n#\n# Licensed under\ \ the Apache License, Version 2.0 (the \"License\");\n# you may not use this\ \ file except in compliance with the License.\n# You may obtain a copy of\ \ the License at\n#\n# https://www.apache.org/licenses/LICENSE-2.0\n#\n\ @@ -2659,44 +2661,44 @@ values: metadata_startup_script: null name: nva-ew4-b network_interface: - - access_config: [] - alias_ip_range: [] - ipv6_access_config: [] - network_ip: 10.80.128.101 - nic_type: null - queue_count: null - security_policy: null - - access_config: [] - alias_ip_range: [] - ipv6_access_config: [] - network_ip: 10.80.0.101 - nic_type: null - queue_count: null - security_policy: null + - access_config: [] + alias_ip_range: [] + ipv6_access_config: [] + network_ip: 10.80.128.101 + nic_type: null + queue_count: null + security_policy: null + - access_config: [] + alias_ip_range: [] + ipv6_access_config: [] + network_ip: 10.80.0.101 + nic_type: null + queue_count: null + security_policy: null network_performance_config: [] params: [] project: fast2-prod-net-landing-0 resource_policies: null scheduling: - - automatic_restart: true - instance_termination_action: null - local_ssd_recovery_timeout: [] - maintenance_interval: null - max_run_duration: [] - min_node_cpus: null - node_affinities: [] - on_host_maintenance: MIGRATE - preemptible: false - provisioning_model: STANDARD + - automatic_restart: true + instance_termination_action: null + local_ssd_recovery_timeout: [] + maintenance_interval: null + max_run_duration: [] + min_node_cpus: null + node_affinities: [] + on_host_maintenance: MIGRATE + preemptible: false + provisioning_model: STANDARD scratch_disk: [] service_account: - - scopes: - - https://www.googleapis.com/auth/devstorage.read_only - - https://www.googleapis.com/auth/logging.write - - https://www.googleapis.com/auth/monitoring.write + - scopes: + - https://www.googleapis.com/auth/devstorage.read_only + - https://www.googleapis.com/auth/logging.write + - https://www.googleapis.com/auth/monitoring.write shielded_instance_config: [] tags: - - nva + - nva timeouts: null zone: europe-west4-b module.nva["secondary-c"].google_compute_instance.default[0]: @@ -2704,15 +2706,15 @@ values: allow_stopping_for_update: true attached_disk: [] boot_disk: - - auto_delete: true - disk_encryption_key_raw: null - initialize_params: - - enable_confidential_compute: null - image: projects/cos-cloud/global/images/family/cos-stable - resource_manager_tags: null - size: 10 - type: pd-balanced - mode: READ_WRITE + - auto_delete: true + disk_encryption_key_raw: null + initialize_params: + - enable_confidential_compute: null + image: projects/cos-cloud/global/images/family/cos-stable + resource_manager_tags: null + size: 10 + type: pd-balanced + mode: READ_WRITE can_ip_forward: true deletion_protection: false description: Managed by the compute-vm Terraform module. @@ -2722,7 +2724,8 @@ values: labels: null machine_type: e2-standard-2 metadata: - user-data: "#cloud-config\n\n# Copyright 2024 Google LLC\n#\n# Licensed under\ + user-data: + "#cloud-config\n\n# Copyright 2024 Google LLC\n#\n# Licensed under\ \ the Apache License, Version 2.0 (the \"License\");\n# you may not use this\ \ file except in compliance with the License.\n# You may obtain a copy of\ \ the License at\n#\n# https://www.apache.org/licenses/LICENSE-2.0\n#\n\ @@ -2909,44 +2912,44 @@ values: metadata_startup_script: null name: nva-ew4-c network_interface: - - access_config: [] - alias_ip_range: [] - ipv6_access_config: [] - network_ip: 10.80.128.102 - nic_type: null - queue_count: null - security_policy: null - - access_config: [] - alias_ip_range: [] - ipv6_access_config: [] - network_ip: 10.80.0.102 - nic_type: null - queue_count: null - security_policy: null + - access_config: [] + alias_ip_range: [] + ipv6_access_config: [] + network_ip: 10.80.128.102 + nic_type: null + queue_count: null + security_policy: null + - access_config: [] + alias_ip_range: [] + ipv6_access_config: [] + network_ip: 10.80.0.102 + nic_type: null + queue_count: null + security_policy: null network_performance_config: [] params: [] project: fast2-prod-net-landing-0 resource_policies: null scheduling: - - automatic_restart: true - instance_termination_action: null - local_ssd_recovery_timeout: [] - maintenance_interval: null - max_run_duration: [] - min_node_cpus: null - node_affinities: [] - on_host_maintenance: MIGRATE - preemptible: false - provisioning_model: STANDARD + - automatic_restart: true + instance_termination_action: null + local_ssd_recovery_timeout: [] + maintenance_interval: null + max_run_duration: [] + min_node_cpus: null + node_affinities: [] + on_host_maintenance: MIGRATE + preemptible: false + provisioning_model: STANDARD scratch_disk: [] service_account: - - scopes: - - https://www.googleapis.com/auth/devstorage.read_only - - https://www.googleapis.com/auth/logging.write - - https://www.googleapis.com/auth/monitoring.write + - scopes: + - https://www.googleapis.com/auth/devstorage.read_only + - https://www.googleapis.com/auth/logging.write + - https://www.googleapis.com/auth/monitoring.write shielded_instance_config: [] tags: - - nva + - nva timeouts: null zone: europe-west4-c module.peering-dev.google_compute_network_peering.local_network_peering: @@ -2977,9 +2980,9 @@ values: import_subnet_routes_with_public_ip: null stack_type: IPV4_ONLY timeouts: null - module.prod-dns-peer-landing-rev-10.google_dns_managed_zone.dns_managed_zone[0]: - cloud_logging_config: - - enable_logging: false + ? module.prod-dns-peer-landing-rev-10.google_dns_managed_zone.dns_managed_zone[0] + : cloud_logging_config: + - enable_logging: false description: Terraform managed. dns_name: 10.in-addr.arpa. dnssec_config: [] @@ -2994,7 +2997,7 @@ values: visibility: private module.prod-dns-peer-landing-root.google_dns_managed_zone.dns_managed_zone[0]: cloud_logging_config: - - enable_logging: false + - enable_logging: false description: Terraform managed. dns_name: . dnssec_config: [] @@ -3009,7 +3012,7 @@ values: visibility: private module.prod-dns-private-zone.google_dns_managed_zone.dns_managed_zone[0]: cloud_logging_config: - - enable_logging: false + - enable_logging: false description: Terraform managed. dns_name: prod.gcp.example.com. dnssec_config: [] @@ -3022,41 +3025,41 @@ values: service_directory_config: [] timeouts: null visibility: private - module.prod-dns-private-zone.google_dns_record_set.dns_record_set["A localhost"]: - managed_zone: prod-gcp-example-com + ? module.prod-dns-private-zone.google_dns_record_set.dns_record_set["A localhost"] + : managed_zone: prod-gcp-example-com name: localhost.prod.gcp.example.com. project: fast2-prod-net-spoke-0 routing_policy: [] rrdatas: - - 127.0.0.1 + - 127.0.0.1 ttl: 300 type: A - module.prod-spoke-firewall.google_compute_firewall.custom-rules["ingress-default-deny"]: - allow: [] + ? module.prod-spoke-firewall.google_compute_firewall.custom-rules["ingress-default-deny"] + : allow: [] deny: - - ports: [] - protocol: all + - ports: [] + protocol: all description: Deny and log any unmatched ingress traffic. direction: INGRESS disabled: false log_config: - - metadata: EXCLUDE_ALL_METADATA + - metadata: EXCLUDE_ALL_METADATA name: ingress-default-deny network: prod-spoke-0 priority: 65535 project: fast2-prod-net-spoke-0 source_ranges: - - 0.0.0.0/0 + - 0.0.0.0/0 source_service_accounts: null source_tags: null target_service_accounts: null target_tags: null timeouts: null - module.prod-spoke-project.google_compute_shared_vpc_host_project.shared_vpc_host[0]: - project: fast2-prod-net-spoke-0 + ? module.prod-spoke-project.google_compute_shared_vpc_host_project.shared_vpc_host[0] + : project: fast2-prod-net-spoke-0 timeouts: null - module.prod-spoke-project.google_monitoring_monitored_project.primary["fast2-prod-net-landing-0"]: - metrics_scope: fast2-prod-net-landing-0 + ? module.prod-spoke-project.google_monitoring_monitored_project.primary["fast2-prod-net-landing-0"] + : metrics_scope: fast2-prod-net-landing-0 name: fast2-prod-net-spoke-0 timeouts: null module.prod-spoke-project.google_project.project[0]: @@ -3069,73 +3072,73 @@ values: project_id: fast2-prod-net-spoke-0 skip_delete: false timeouts: null - module.prod-spoke-project.google_project_iam_binding.authoritative["roles/dns.admin"]: - condition: [] + ? module.prod-spoke-project.google_project_iam_binding.authoritative["roles/dns.admin"] + : condition: [] members: - - serviceAccount:string + - serviceAccount:string project: fast2-prod-net-spoke-0 role: roles/dns.admin - module.prod-spoke-project.google_project_iam_binding.bindings["sa_delegated_grants"]: - condition: - - description: Production host project delegated grants. - expression: api.getAttribute('iam.googleapis.com/modifiedGrantsByRole', []).hasOnly(['roles/composer.sharedVpcAgent','roles/compute.networkUser','roles/compute.networkViewer','roles/container.hostServiceAgentUser','roles/multiclusterservicediscovery.serviceAgent','roles/vpcaccess.user']) - title: prod_stage3_sa_delegated_grants + ? module.prod-spoke-project.google_project_iam_binding.bindings["sa_delegated_grants"] + : condition: + - description: Production host project delegated grants. + expression: api.getAttribute('iam.googleapis.com/modifiedGrantsByRole', []).hasOnly(['roles/composer.sharedVpcAgent','roles/compute.networkUser','roles/compute.networkViewer','roles/container.hostServiceAgentUser','roles/multiclusterservicediscovery.serviceAgent','roles/vpcaccess.user']) + title: prod_stage3_sa_delegated_grants members: - - serviceAccount:string + - serviceAccount:string project: fast2-prod-net-spoke-0 role: roles/resourcemanager.projectIamAdmin module.prod-spoke-project.google_project_iam_member.servicenetworking[0]: condition: [] project: fast2-prod-net-spoke-0 role: roles/servicenetworking.serviceAgent - module.prod-spoke-project.google_project_service.project_services["compute.googleapis.com"]: - disable_dependent_services: false + ? module.prod-spoke-project.google_project_service.project_services["compute.googleapis.com"] + : disable_dependent_services: false disable_on_destroy: false project: fast2-prod-net-spoke-0 service: compute.googleapis.com timeouts: null - module.prod-spoke-project.google_project_service.project_services["dns.googleapis.com"]: - disable_dependent_services: false + ? module.prod-spoke-project.google_project_service.project_services["dns.googleapis.com"] + : disable_dependent_services: false disable_on_destroy: false project: fast2-prod-net-spoke-0 service: dns.googleapis.com timeouts: null - module.prod-spoke-project.google_project_service.project_services["iap.googleapis.com"]: - disable_dependent_services: false + ? module.prod-spoke-project.google_project_service.project_services["iap.googleapis.com"] + : disable_dependent_services: false disable_on_destroy: false project: fast2-prod-net-spoke-0 service: iap.googleapis.com timeouts: null - module.prod-spoke-project.google_project_service.project_services["networkmanagement.googleapis.com"]: - disable_dependent_services: false + ? module.prod-spoke-project.google_project_service.project_services["networkmanagement.googleapis.com"] + : disable_dependent_services: false disable_on_destroy: false project: fast2-prod-net-spoke-0 service: networkmanagement.googleapis.com timeouts: null - module.prod-spoke-project.google_project_service.project_services["servicenetworking.googleapis.com"]: - disable_dependent_services: false + ? module.prod-spoke-project.google_project_service.project_services["servicenetworking.googleapis.com"] + : disable_dependent_services: false disable_on_destroy: false project: fast2-prod-net-spoke-0 service: servicenetworking.googleapis.com timeouts: null - module.prod-spoke-project.google_project_service.project_services["stackdriver.googleapis.com"]: - disable_dependent_services: false + ? module.prod-spoke-project.google_project_service.project_services["stackdriver.googleapis.com"] + : disable_dependent_services: false disable_on_destroy: false project: fast2-prod-net-spoke-0 service: stackdriver.googleapis.com timeouts: null - module.prod-spoke-project.google_project_service.project_services["vpcaccess.googleapis.com"]: - disable_dependent_services: false + ? module.prod-spoke-project.google_project_service.project_services["vpcaccess.googleapis.com"] + : disable_dependent_services: false disable_on_destroy: false project: fast2-prod-net-spoke-0 service: vpcaccess.googleapis.com timeouts: null - module.prod-spoke-project.google_project_service_identity.jit_si["iap.googleapis.com"]: - project: fast2-prod-net-spoke-0 + ? module.prod-spoke-project.google_project_service_identity.jit_si["iap.googleapis.com"] + : project: fast2-prod-net-spoke-0 service: iap.googleapis.com timeouts: null - module.prod-spoke-project.google_project_service_identity.servicenetworking[0]: - project: fast2-prod-net-spoke-0 + ? module.prod-spoke-project.google_project_service_identity.servicenetworking[0] + : project: fast2-prod-net-spoke-0 service: servicenetworking.googleapis.com timeouts: null module.prod-spoke-vpc.google_compute_network.network[0]: @@ -3175,8 +3178,8 @@ values: project: fast2-prod-net-spoke-0 tags: null timeouts: null - module.prod-spoke-vpc.google_compute_subnetwork.subnetwork["europe-west1/prod-default"]: - description: Default europe-west1 subnet for prod + ? module.prod-spoke-vpc.google_compute_subnetwork.subnetwork["europe-west1/prod-default"] + : description: Default europe-west1 subnet for prod ip_cidr_range: 10.72.0.0/24 ipv6_access_type: null log_config: [] @@ -3186,10 +3189,9 @@ values: project: fast2-prod-net-spoke-0 region: europe-west1 role: null - secondary_ip_range: [] timeouts: null - module.prod-spoke-vpc.google_compute_subnetwork.subnetwork["europe-west4/prod-default"]: - description: Default europe-west4 subnet for prod + ? module.prod-spoke-vpc.google_compute_subnetwork.subnetwork["europe-west4/prod-default"] + : description: Default europe-west4 subnet for prod ip_cidr_range: 10.88.0.0/24 ipv6_access_type: null log_config: [] @@ -3199,7 +3201,6 @@ values: project: fast2-prod-net-spoke-0 region: europe-west4 role: null - secondary_ip_range: [] timeouts: null module.prod-spoke-vpc.google_dns_policy.default[0]: alternative_name_server_config: [] @@ -3208,18 +3209,18 @@ values: enable_logging: true name: prod-spoke-0 networks: - - {} + - {} project: fast2-prod-net-spoke-0 timeouts: null module.spokes-dmz["primary"].google_compute_router.cr: bgp: - - advertise_mode: CUSTOM - advertised_groups: [] - advertised_ip_ranges: - - description: Default route. - range: 0.0.0.0/0 - asn: 64512 - keepalive_interval: 20 + - advertise_mode: CUSTOM + advertised_groups: [] + advertised_ip_ranges: + - description: Default route. + range: 0.0.0.0/0 + asn: 64512 + keepalive_interval: 20 description: null encrypted_interconnect_router: null name: prod-spoke-dmz-ew1-cr @@ -3306,10 +3307,10 @@ values: labels: null linked_interconnect_attachments: [] linked_router_appliance_instances: - - instances: - - {} - - {} - site_to_site_data_transfer: false + - instances: + - {} + - {} + site_to_site_data_transfer: false linked_vpc_network: [] linked_vpn_tunnels: [] location: europe-west1 @@ -3318,13 +3319,13 @@ values: timeouts: null module.spokes-dmz["secondary"].google_compute_router.cr: bgp: - - advertise_mode: CUSTOM - advertised_groups: [] - advertised_ip_ranges: - - description: Default route. - range: 0.0.0.0/0 - asn: 64512 - keepalive_interval: 20 + - advertise_mode: CUSTOM + advertised_groups: [] + advertised_ip_ranges: + - description: Default route. + range: 0.0.0.0/0 + asn: 64512 + keepalive_interval: 20 description: null encrypted_interconnect_router: null name: prod-spoke-dmz-ew4-cr @@ -3411,10 +3412,10 @@ values: labels: null linked_interconnect_attachments: [] linked_router_appliance_instances: - - instances: - - {} - - {} - site_to_site_data_transfer: false + - instances: + - {} + - {} + site_to_site_data_transfer: false linked_vpc_network: [] linked_vpn_tunnels: [] location: europe-west4 @@ -3423,23 +3424,23 @@ values: timeouts: null module.spokes-landing["primary"].google_compute_router.cr: bgp: - - advertise_mode: CUSTOM - advertised_groups: [] - advertised_ip_ranges: - - description: GCP landing primary. - range: 10.64.0.0/17 - - description: GCP dev primary. - range: 10.68.0.0/16 - - description: GCP prod primary. - range: 10.72.0.0/16 - - description: GCP landing secondary. - range: 10.80.0.0/17 - - description: GCP dev secondary. - range: 10.84.0.0/16 - - description: GCP prod secondary. - range: 10.88.0.0/16 - asn: 64515 - keepalive_interval: 20 + - advertise_mode: CUSTOM + advertised_groups: [] + advertised_ip_ranges: + - description: GCP landing primary. + range: 10.64.0.0/17 + - description: GCP dev primary. + range: 10.68.0.0/16 + - description: GCP prod primary. + range: 10.72.0.0/16 + - description: GCP landing secondary. + range: 10.80.0.0/17 + - description: GCP dev secondary. + range: 10.84.0.0/16 + - description: GCP prod secondary. + range: 10.88.0.0/16 + asn: 64515 + keepalive_interval: 20 description: null encrypted_interconnect_router: null name: prod-spoke-landing-ew1-cr @@ -3526,10 +3527,10 @@ values: labels: null linked_interconnect_attachments: [] linked_router_appliance_instances: - - instances: - - {} - - {} - site_to_site_data_transfer: false + - instances: + - {} + - {} + site_to_site_data_transfer: false linked_vpc_network: [] linked_vpn_tunnels: [] location: europe-west1 @@ -3538,23 +3539,23 @@ values: timeouts: null module.spokes-landing["secondary"].google_compute_router.cr: bgp: - - advertise_mode: CUSTOM - advertised_groups: [] - advertised_ip_ranges: - - description: GCP landing primary. - range: 10.64.0.0/17 - - description: GCP dev primary. - range: 10.68.0.0/16 - - description: GCP prod primary. - range: 10.72.0.0/16 - - description: GCP landing secondary. - range: 10.80.0.0/17 - - description: GCP dev secondary. - range: 10.84.0.0/16 - - description: GCP prod secondary. - range: 10.88.0.0/16 - asn: 64515 - keepalive_interval: 20 + - advertise_mode: CUSTOM + advertised_groups: [] + advertised_ip_ranges: + - description: GCP landing primary. + range: 10.64.0.0/17 + - description: GCP dev primary. + range: 10.68.0.0/16 + - description: GCP prod primary. + range: 10.72.0.0/16 + - description: GCP landing secondary. + range: 10.80.0.0/17 + - description: GCP dev secondary. + range: 10.84.0.0/16 + - description: GCP prod secondary. + range: 10.88.0.0/16 + asn: 64515 + keepalive_interval: 20 description: null encrypted_interconnect_router: null name: prod-spoke-landing-ew4-cr @@ -3641,10 +3642,10 @@ values: labels: null linked_interconnect_attachments: [] linked_router_appliance_instances: - - instances: - - {} - - {} - site_to_site_data_transfer: false + - instances: + - {} + - {} + site_to_site_data_transfer: false linked_vpc_network: [] linked_vpn_tunnels: [] location: europe-west4 @@ -3702,4 +3703,3 @@ outputs: shared_vpc_self_links: __missing__ tfvars: __missing__ vpn_gateway_endpoints: __missing__ - diff --git a/tests/modules/gke_hub/examples/full.yaml b/tests/modules/gke_hub/examples/full.yaml index 9572e071a6..ee78e1d7cc 100644 --- a/tests/modules/gke_hub/examples/full.yaml +++ b/tests/modules/gke_hub/examples/full.yaml @@ -15,32 +15,32 @@ values: module.cluster_1.google_container_cluster.cluster: addons_config: - - cloudrun_config: - - disabled: true - load_balancer_type: null - config_connector_config: - - enabled: false - dns_cache_config: - - enabled: false - gce_persistent_disk_csi_driver_config: - - enabled: false - gcp_filestore_csi_driver_config: - - enabled: false - gcs_fuse_csi_driver_config: - - enabled: false - gke_backup_agent_config: - - enabled: false - horizontal_pod_autoscaling: - - disabled: false - http_load_balancing: - - disabled: false - istio_config: - - auth: null - disabled: true - kalm_config: - - enabled: false - network_policy_config: - - disabled: true + - cloudrun_config: + - disabled: true + load_balancer_type: null + config_connector_config: + - enabled: false + dns_cache_config: + - enabled: false + gce_persistent_disk_csi_driver_config: + - enabled: false + gcp_filestore_csi_driver_config: + - enabled: false + gcs_fuse_csi_driver_config: + - enabled: false + gke_backup_agent_config: + - enabled: false + horizontal_pod_autoscaling: + - disabled: false + http_load_balancing: + - disabled: false + istio_config: + - auth: null + disabled: true + kalm_config: + - enabled: false + network_policy_config: + - disabled: true allow_net_admin: null binary_authorization: [] datapath_provider: ADVANCED_DATAPATH @@ -62,69 +62,69 @@ values: initial_node_count: 1 location: europe-west1 logging_config: - - enable_components: - - SYSTEM_COMPONENTS + - enable_components: + - SYSTEM_COMPONENTS maintenance_policy: - - daily_maintenance_window: - - start_time: 03:00 - maintenance_exclusion: [] - recurring_window: [] + - daily_maintenance_window: + - start_time: 03:00 + maintenance_exclusion: [] + recurring_window: [] master_auth: - - client_certificate_config: - - issue_client_certificate: false + - client_certificate_config: + - issue_client_certificate: false master_authorized_networks_config: - - cidr_blocks: - - cidr_block: 10.0.0.0/8 - display_name: rfc1918_10_8 + - cidr_blocks: + - cidr_block: 10.0.0.0/8 + display_name: rfc1918_10_8 min_master_version: null monitoring_config: - - enable_components: - - SYSTEM_COMPONENTS - managed_prometheus: - - enabled: true + - enable_components: + - SYSTEM_COMPONENTS + managed_prometheus: + - enabled: true name: cluster-1 network_policy: [] node_config: - - advanced_machine_features: [] - boot_disk_kms_key: null - enable_confidential_storage: null - ephemeral_storage_config: [] - ephemeral_storage_local_ssd_config: [] - fast_socket: [] - gcfs_config: [] - gvnic: [] - host_maintenance_policy: [] - kubelet_config: [] - linux_node_config: [] - local_nvme_ssd_block_config: [] - node_group: null - preemptible: false - reservation_affinity: [] - resource_labels: null - sandbox_config: [] - sole_tenant_config: [] - spot: false - tags: null - taint: [] + - advanced_machine_features: [] + boot_disk_kms_key: null + enable_confidential_storage: null + ephemeral_storage_config: [] + ephemeral_storage_local_ssd_config: [] + fast_socket: [] + gcfs_config: [] + gvnic: [] + host_maintenance_policy: [] + kubelet_config: [] + linux_node_config: [] + local_nvme_ssd_block_config: [] + node_group: null + preemptible: false + reservation_affinity: [] + resource_labels: null + sandbox_config: [] + sole_tenant_config: [] + spot: false + tags: null + taint: [] node_pool_defaults: - - node_config_defaults: - - gcfs_config: - - enabled: false + - node_config_defaults: + - gcfs_config: + - enabled: false pod_security_policy_config: [] private_cluster_config: - - enable_private_endpoint: true - enable_private_nodes: true - master_global_access_config: - - enabled: false - master_ipv4_cidr_block: 192.168.0.0/28 - private_endpoint_subnetwork: null + - enable_private_endpoint: true + enable_private_nodes: true + master_global_access_config: + - enabled: false + master_ipv4_cidr_block: 192.168.0.0/28 + private_endpoint_subnetwork: null project: gkehub-test remove_default_node_pool: true resource_labels: null resource_usage_export_config: [] timeouts: null workload_identity_config: - - workload_pool: gkehub-test.svc.id.goog + - workload_pool: gkehub-test.svc.id.goog module.hub.google_gke_hub_feature.default["configmanagement"]: fleet_default_member_config: [] labels: null @@ -135,32 +135,32 @@ values: timeouts: null module.hub.google_gke_hub_feature_membership.default["cluster-1"]: configmanagement: - - config_sync: - - git: - - gcp_service_account_email: null - https_proxy: null - policy_dir: configsync - secret_type: none - sync_branch: main - sync_repo: https://github.com/danielmarzini/configsync-platform-example - sync_rev: null - sync_wait_secs: null - metrics_gcp_service_account_email: null - oci: [] - source_format: hierarchy - hierarchy_controller: - - enable_hierarchical_resource_quota: true - enable_pod_tree_labels: true - enabled: true - policy_controller: - - audit_interval_seconds: '120' - enabled: true - exemptable_namespaces: null - log_denies_enabled: true - mutation_enabled: null - referential_rules_enabled: true - template_library_installed: true - version: v1 + - config_sync: + - git: + - gcp_service_account_email: null + https_proxy: null + policy_dir: configsync + secret_type: none + sync_branch: main + sync_repo: https://github.com/danielmarzini/configsync-platform-example + sync_rev: null + sync_wait_secs: null + metrics_gcp_service_account_email: null + oci: [] + source_format: hierarchy + hierarchy_controller: + - enable_hierarchical_resource_quota: true + enable_pod_tree_labels: true + enabled: true + policy_controller: + - audit_interval_seconds: "120" + enabled: true + exemptable_namespaces: null + log_denies_enabled: true + mutation_enabled: null + referential_rules_enabled: true + template_library_installed: true + version: v1 feature: configmanagement location: global membership: cluster-1 @@ -172,8 +172,8 @@ values: authority: [] description: null endpoint: - - gke_cluster: - - {} + - gke_cluster: + - {} labels: null location: global membership_id: cluster-1 @@ -182,33 +182,33 @@ values: module.project.google_project.project[0]: auto_create_network: false billing_account: 123456-123456-123456 - folder_id: '12345' + folder_id: "12345" labels: null name: gkehub-test org_id: null project_id: gkehub-test skip_delete: false timeouts: null - module.project.google_project_service.project_services["anthosconfigmanagement.googleapis.com"]: - disable_dependent_services: false + ? module.project.google_project_service.project_services["anthosconfigmanagement.googleapis.com"] + : disable_dependent_services: false disable_on_destroy: false project: gkehub-test service: anthosconfigmanagement.googleapis.com timeouts: null - module.project.google_project_service.project_services["container.googleapis.com"]: - disable_dependent_services: false + ? module.project.google_project_service.project_services["container.googleapis.com"] + : disable_dependent_services: false disable_on_destroy: false project: gkehub-test service: container.googleapis.com timeouts: null - module.project.google_project_service.project_services["gkeconnect.googleapis.com"]: - disable_dependent_services: false + ? module.project.google_project_service.project_services["gkeconnect.googleapis.com"] + : disable_dependent_services: false disable_on_destroy: false project: gkehub-test service: gkeconnect.googleapis.com timeouts: null - module.project.google_project_service.project_services["gkehub.googleapis.com"]: - disable_dependent_services: false + ? module.project.google_project_service.project_services["gkehub.googleapis.com"] + : disable_dependent_services: false disable_on_destroy: false project: gkehub-test service: gkehub.googleapis.com @@ -219,24 +219,24 @@ values: project: gkehub-test service: mesh.googleapis.com timeouts: null - module.project.google_project_service.project_services["multiclusteringress.googleapis.com"]: - disable_dependent_services: false + ? module.project.google_project_service.project_services["multiclusteringress.googleapis.com"] + : disable_dependent_services: false disable_on_destroy: false project: gkehub-test service: multiclusteringress.googleapis.com timeouts: null - module.project.google_project_service.project_services["multiclusterservicediscovery.googleapis.com"]: - disable_dependent_services: false + ? module.project.google_project_service.project_services["multiclusterservicediscovery.googleapis.com"] + : disable_dependent_services: false disable_on_destroy: false project: gkehub-test service: multiclusterservicediscovery.googleapis.com timeouts: null - module.project.google_project_service_identity.jit_si["gkehub.googleapis.com"]: - project: gkehub-test + ? module.project.google_project_service_identity.jit_si["gkehub.googleapis.com"] + : project: gkehub-test service: gkehub.googleapis.com timeouts: null - module.project.google_project_service_identity.jit_si["multiclusteringress.googleapis.com"]: - project: gkehub-test + ? module.project.google_project_service_identity.jit_si["multiclusteringress.googleapis.com"] + : project: gkehub-test service: multiclusteringress.googleapis.com timeouts: null module.vpc.google_compute_network.network[0]: @@ -283,7 +283,6 @@ values: project: gkehub-test region: europe-west1 role: null - secondary_ip_range: [] timeouts: null counts: diff --git a/tests/modules/net_cloudnat/examples/hybrid.yaml b/tests/modules/net_cloudnat/examples/hybrid.yaml index 4dd1939598..dbfdd49819 100644 --- a/tests/modules/net_cloudnat/examples/hybrid.yaml +++ b/tests/modules/net_cloudnat/examples/hybrid.yaml @@ -26,8 +26,8 @@ values: enable_endpoint_independent_mapping: false icmp_idle_timeout_sec: 30 log_config: - - enable: false - filter: ALL + - enable: false + filter: ALL max_ports_per_vm: null name: vpc1-nat nat_ip_allocate_option: null @@ -36,18 +36,18 @@ values: region: europe-west8 router: vpc1-nat-nat rules: - - action: - - source_nat_active_ips: [] - source_nat_drain_ips: [] - source_nat_drain_ranges: [] - description: private nat - match: nexthop.is_hybrid - rule_number: 0 + - action: + - source_nat_active_ips: [] + source_nat_drain_ips: [] + source_nat_drain_ranges: [] + description: private nat + match: nexthop.is_hybrid + rule_number: 0 source_subnetwork_ip_ranges_to_nat: LIST_OF_SUBNETWORKS subnetwork: - - secondary_ip_range_names: [] - source_ip_ranges_to_nat: - - ALL_IP_RANGES + - secondary_ip_range_names: [] + source_ip_ranges_to_nat: + - ALL_IP_RANGES tcp_established_idle_timeout_sec: 1200 tcp_time_wait_timeout_sec: 120 tcp_transitory_idle_timeout_sec: 30 @@ -84,7 +84,6 @@ values: project: project-id region: europe-west8 role: null - secondary_ip_range: [] counts: google_compute_network: 1 diff --git a/tests/modules/net_vpc/examples/factory.yaml b/tests/modules/net_vpc/examples/factory.yaml index 35227c7734..32f5aadb8f 100644 --- a/tests/modules/net_vpc/examples/factory.yaml +++ b/tests/modules/net_vpc/examples/factory.yaml @@ -58,8 +58,8 @@ values: region: europe-west4 role: ACTIVE timeouts: null - module.vpc.google_compute_subnetwork.proxy_only["australia-southeast2/subnet-proxy-global"]: - description: Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB. + ? module.vpc.google_compute_subnetwork.proxy_only["australia-southeast2/subnet-proxy-global"] + : description: Terraform-managed proxy-only subnet for Regional HTTPS, Internal HTTPS or Cross-Regional HTTPS Internal LB. ip_cidr_range: 10.4.0.0/24 ipv6_access_type: null log_config: [] @@ -80,24 +80,24 @@ values: region: europe-west4 role: null timeouts: null - module.vpc.google_compute_subnetwork.subnetwork["europe-west1/subnet-detailed"]: - description: Sample description + ? module.vpc.google_compute_subnetwork.subnetwork["europe-west1/subnet-detailed"] + : description: Sample description ip_cidr_range: 10.0.0.0/24 ipv6_access_type: null log_config: - - aggregation_interval: INTERVAL_5_SEC - filter_expr: 'true' - flow_sampling: 0.5 - metadata: INCLUDE_ALL_METADATA - metadata_fields: null + - aggregation_interval: INTERVAL_5_SEC + filter_expr: "true" + flow_sampling: 0.5 + metadata: INCLUDE_ALL_METADATA + metadata_fields: null name: subnet-detailed private_ip_google_access: false project: project-id region: europe-west1 role: null secondary_ip_range: - - ip_cidr_range: 192.168.0.0/24 - range_name: secondary-range-a + - ip_cidr_range: 192.168.0.0/24 + range_name: secondary-range-a timeouts: null module.vpc.google_compute_subnetwork.subnetwork["europe-west4/simple"]: description: Terraform-managed. @@ -109,7 +109,6 @@ values: project: project-id region: europe-west4 role: null - secondary_ip_range: [] timeouts: null module.vpc.google_compute_subnetwork.subnetwork["europe-west8/simple"]: description: Terraform-managed. @@ -121,14 +120,13 @@ values: project: project-id region: europe-west8 role: null - secondary_ip_range: [] timeouts: null - module.vpc.google_compute_subnetwork_iam_binding.authoritative["europe-west1/subnet-detailed.roles/compute.networkUser"]: - condition: [] + ? module.vpc.google_compute_subnetwork_iam_binding.authoritative["europe-west1/subnet-detailed.roles/compute.networkUser"] + : condition: [] members: - - group:lorem@example.com - - serviceAccount:fbz@prj.iam.gserviceaccount.com - - user:foobar@example.com + - group:lorem@example.com + - serviceAccount:fbz@prj.iam.gserviceaccount.com + - user:foobar@example.com project: project-id region: europe-west1 role: roles/compute.networkUser @@ -142,4 +140,4 @@ counts: modules: 1 resources: 10 -outputs: {} \ No newline at end of file +outputs: {} diff --git a/tests/modules/net_vpc/examples/firewall_policy_enforcement_order.yaml b/tests/modules/net_vpc/examples/firewall_policy_enforcement_order.yaml index 6a9523396f..9ce65336b8 100644 --- a/tests/modules/net_vpc/examples/firewall_policy_enforcement_order.yaml +++ b/tests/modules/net_vpc/examples/firewall_policy_enforcement_order.yaml @@ -31,10 +31,10 @@ values: region: europe-west1 role: null secondary_ip_range: - - ip_cidr_range: 172.16.0.0/20 - range_name: pods - - ip_cidr_range: 192.168.0.0/24 - range_name: services + - ip_cidr_range: 172.16.0.0/20 + range_name: pods + - ip_cidr_range: 192.168.0.0/24 + range_name: services module.vpc.google_compute_subnetwork.subnetwork["europe-west2/production"]: description: Terraform-managed. ip_cidr_range: 10.0.16.0/24 @@ -44,8 +44,7 @@ values: project: project-id region: europe-west2 role: null - secondary_ip_range: [] counts: google_compute_network: 1 - google_compute_subnetwork: 2 \ No newline at end of file + google_compute_subnetwork: 2 diff --git a/tests/modules/net_vpc/examples/ipv6.yaml b/tests/modules/net_vpc/examples/ipv6.yaml index 267a24b759..c3e104882d 100644 --- a/tests/modules/net_vpc/examples/ipv6.yaml +++ b/tests/modules/net_vpc/examples/ipv6.yaml @@ -58,7 +58,6 @@ values: project: project-id region: europe-west1 role: null - secondary_ip_range: [] stack_type: IPV4_IPV6 timeouts: null module.vpc.google_compute_subnetwork.subnetwork["europe-west3/test"]: @@ -71,7 +70,6 @@ values: project: project-id region: europe-west3 role: null - secondary_ip_range: [] stack_type: IPV4_IPV6 timeouts: null @@ -82,4 +80,4 @@ counts: modules: 1 resources: 5 -outputs: {} \ No newline at end of file +outputs: {} diff --git a/tests/modules/net_vpc/examples/psa-routes.yaml b/tests/modules/net_vpc/examples/psa-routes.yaml index a9a8bfddb3..4744420bd1 100644 --- a/tests/modules/net_vpc/examples/psa-routes.yaml +++ b/tests/modules/net_vpc/examples/psa-routes.yaml @@ -13,8 +13,8 @@ # limitations under the License. values: - module.vpc.google_compute_global_address.psa_ranges["servicenetworking-googleapis-com-myrange"]: - address: 10.0.1.0 + ? module.vpc.google_compute_global_address.psa_ranges["servicenetworking-googleapis-com-myrange"] + : address: 10.0.1.0 address_type: INTERNAL description: null ip_version: null @@ -33,8 +33,8 @@ values: project: project-id routing_mode: GLOBAL timeouts: null - module.vpc.google_compute_network_peering_routes_config.psa_routes["servicenetworking.googleapis.com"]: - export_custom_routes: true + ? module.vpc.google_compute_network_peering_routes_config.psa_routes["servicenetworking.googleapis.com"] + : export_custom_routes: true import_custom_routes: true network: my-network project: project-id @@ -76,16 +76,15 @@ values: project: project-id region: europe-west1 role: null - secondary_ip_range: [] timeouts: null - module.vpc.google_service_networking_connection.psa_connection["servicenetworking.googleapis.com"]: - deletion_policy: null + ? module.vpc.google_service_networking_connection.psa_connection["servicenetworking.googleapis.com"] + : deletion_policy: null reserved_peering_ranges: - - servicenetworking-googleapis-com-myrange + - servicenetworking-googleapis-com-myrange service: servicenetworking.googleapis.com timeouts: null - module.vpc.google_service_networking_peered_dns_domain.name["servicenetworking-googleapis-com-gcp-example-com"]: - dns_suffix: gcp.example.com. + ? module.vpc.google_service_networking_peered_dns_domain.name["servicenetworking-googleapis-com-gcp-example-com"] + : dns_suffix: gcp.example.com. name: servicenetworking-googleapis-com-gcp-example-com network: my-network project: project-id diff --git a/tests/modules/net_vpc/examples/psa.yaml b/tests/modules/net_vpc/examples/psa.yaml index 806bf443f6..7ff46beb43 100644 --- a/tests/modules/net_vpc/examples/psa.yaml +++ b/tests/modules/net_vpc/examples/psa.yaml @@ -13,8 +13,8 @@ # limitations under the License. values: - module.vpc.google_compute_global_address.psa_ranges["servicenetworking-googleapis-com-myrange"]: - address: 10.0.1.0 + ? module.vpc.google_compute_global_address.psa_ranges["servicenetworking-googleapis-com-myrange"] + : address: 10.0.1.0 address_type: INTERNAL description: null ip_version: null @@ -33,8 +33,8 @@ values: project: project-id routing_mode: GLOBAL timeouts: null - module.vpc.google_compute_network_peering_routes_config.psa_routes["servicenetworking.googleapis.com"]: - export_custom_routes: false + ? module.vpc.google_compute_network_peering_routes_config.psa_routes["servicenetworking.googleapis.com"] + : export_custom_routes: false import_custom_routes: false network: my-network project: project-id @@ -76,12 +76,11 @@ values: project: project-id region: europe-west1 role: null - secondary_ip_range: [] timeouts: null - module.vpc.google_service_networking_connection.psa_connection["servicenetworking.googleapis.com"]: - deletion_policy: null + ? module.vpc.google_service_networking_connection.psa_connection["servicenetworking.googleapis.com"] + : deletion_policy: null reserved_peering_ranges: - - servicenetworking-googleapis-com-myrange + - servicenetworking-googleapis-com-myrange service: servicenetworking.googleapis.com timeouts: null diff --git a/tests/modules/net_vpc/examples/simple.yaml b/tests/modules/net_vpc/examples/simple.yaml index 95e29f2e7e..9bbe4af635 100644 --- a/tests/modules/net_vpc/examples/simple.yaml +++ b/tests/modules/net_vpc/examples/simple.yaml @@ -30,10 +30,10 @@ values: region: europe-west1 role: null secondary_ip_range: - - ip_cidr_range: 172.16.0.0/20 - range_name: pods - - ip_cidr_range: 192.168.0.0/24 - range_name: services + - ip_cidr_range: 172.16.0.0/20 + range_name: pods + - ip_cidr_range: 192.168.0.0/24 + range_name: services module.vpc.google_compute_subnetwork.subnetwork["europe-west2/production"]: description: Terraform-managed. ip_cidr_range: 10.0.16.0/24 @@ -43,7 +43,6 @@ values: project: project-id region: europe-west2 role: null - secondary_ip_range: [] module.vpc.google_compute_route.gateway["private-googleapis"]: dest_range: 199.36.153.8/30 name: my-network-private-googleapis @@ -71,4 +70,4 @@ values: counts: google_compute_network: 1 google_compute_subnetwork: 2 - google_compute_route: 2 \ No newline at end of file + google_compute_route: 2 diff --git a/tests/modules/net_vpc/examples/subnet-iam.yaml b/tests/modules/net_vpc/examples/subnet-iam.yaml index 8e15383734..a99d1c5db8 100644 --- a/tests/modules/net_vpc/examples/subnet-iam.yaml +++ b/tests/modules/net_vpc/examples/subnet-iam.yaml @@ -57,7 +57,6 @@ values: project: project-id region: europe-west1 role: null - secondary_ip_range: [] timeouts: null module.vpc.google_compute_subnetwork.subnetwork["europe-west1/subnet-2"]: description: Terraform-managed. @@ -69,23 +68,22 @@ values: project: project-id region: europe-west1 role: null - secondary_ip_range: [] timeouts: null - module.vpc.google_compute_subnetwork_iam_binding.authoritative["europe-west1/subnet-1.roles/compute.networkUser"]: - condition: [] + ? module.vpc.google_compute_subnetwork_iam_binding.authoritative["europe-west1/subnet-1.roles/compute.networkUser"] + : condition: [] members: - - group:organization-admins@example.org + - group:organization-admins@example.org project: project-id region: europe-west1 role: roles/compute.networkUser subnetwork: subnet-1 module.vpc.google_compute_subnetwork_iam_binding.bindings["subnet-1-iam"]: condition: - - description: null - expression: resource.matchTag('123456789012/env', 'prod') - title: test_condition + - description: null + expression: resource.matchTag('123456789012/env', 'prod') + title: test_condition members: - - group:organization-admins@example.org + - group:organization-admins@example.org project: project-id region: europe-west1 role: roles/compute.networkUser @@ -107,4 +105,4 @@ counts: modules: 1 resources: 8 -outputs: {} \ No newline at end of file +outputs: {} diff --git a/tests/modules/net_vpc/examples/subnet-options.yaml b/tests/modules/net_vpc/examples/subnet-options.yaml index 9fd35fa5a1..d500a9666b 100644 --- a/tests/modules/net_vpc/examples/subnet-options.yaml +++ b/tests/modules/net_vpc/examples/subnet-options.yaml @@ -24,7 +24,6 @@ values: private_ip_google_access: false project: project-id region: europe-west1 - secondary_ip_range: [] module.vpc.google_compute_subnetwork.subnetwork["europe-west1/simple"]: description: Terraform-managed. ip_cidr_range: 10.0.0.0/24 @@ -33,25 +32,23 @@ values: private_ip_google_access: true project: project-id region: europe-west1 - secondary_ip_range: [] - module.vpc.google_compute_subnetwork.subnetwork["europe-west1/with-flow-logs"]: - description: Terraform-managed. + ? module.vpc.google_compute_subnetwork.subnetwork["europe-west1/with-flow-logs"] + : description: Terraform-managed. ip_cidr_range: 10.0.3.0/24 ipv6_access_type: null log_config: - - aggregation_interval: INTERVAL_10_MIN - filter_expr: 'true' - flow_sampling: 0.5 - metadata: INCLUDE_ALL_METADATA - metadata_fields: null + - aggregation_interval: INTERVAL_10_MIN + filter_expr: "true" + flow_sampling: 0.5 + metadata: INCLUDE_ALL_METADATA + metadata_fields: null name: with-flow-logs private_ip_google_access: true project: project-id region: europe-west1 role: null - secondary_ip_range: [] - module.vpc.google_compute_subnetwork.subnetwork["europe-west1/with-secondary-ranges"]: - description: Terraform-managed. + ? module.vpc.google_compute_subnetwork.subnetwork["europe-west1/with-secondary-ranges"] + : description: Terraform-managed. ip_cidr_range: 10.0.2.0/24 log_config: [] name: with-secondary-ranges @@ -60,11 +57,11 @@ values: region: europe-west1 role: null secondary_ip_range: - - ip_cidr_range: 192.168.0.0/24 - range_name: a - - ip_cidr_range: 192.168.1.0/24 - range_name: b + - ip_cidr_range: 192.168.0.0/24 + range_name: a + - ip_cidr_range: 192.168.1.0/24 + range_name: b counts: google_compute_network: 1 - google_compute_subnetwork: 4 \ No newline at end of file + google_compute_subnetwork: 4