You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
BREAKING CHANGE: Some unused variables were removed. See the upgrade guide for details.
BREAKING CHANGE: Buckets now enable uniform bucket-level access by default. See the upgrade guide for details.
Copy file name to clipboardexpand all lines: README.md
-2
Original file line number
Diff line number
Diff line change
@@ -126,7 +126,6 @@ determining that location is as follows:
126
126
| budget\_monitoring\_notification\_channels | A list of monitoring notification channels in the form `[projects/{project_id}/notificationChannels/{channel_id}]`. A maximum of 5 channels are allowed. |`list(string)`|`[]`| no |
127
127
| consumer\_quotas | The quotas configuration you want to override for the project. | <pre>list(object({<br> service = string,<br> metric = string,<br> limit = string,<br> value = string,<br> }))</pre> |`[]`| no |
128
128
| create\_project\_sa | Whether the default service account for the project shall be created |`bool`|`true`| no |
129
-
| credentials\_path | Path to a service account credentials file with rights to run the Project Factory. If this file is absent Terraform will fall back to Application Default Credentials. |`string`|`""`| no |
130
129
| default\_service\_account | Project default service account setting: can be one of `delete`, `deprivilege`, `disable`, or `keep`. |`string`|`"disable"`| no |
131
130
| disable\_dependent\_services | Whether services that are enabled and which depend on this service should also be disabled when this service is destroyed. |`bool`|`true`| no |
132
131
| disable\_services\_on\_destroy | Whether project services will be disabled when the resources are destroyed |`bool`|`true`| no |
@@ -136,7 +135,6 @@ determining that location is as follows:
136
135
| grant\_services\_security\_admin\_role | Whether or not to grant Kubernetes Engine Service Agent the Security Admin role on the host project so it can manage firewall rules |`bool`|`false`| no |
137
136
| group\_name | A group to control the project by being assigned group\_role (defaults to project editor) |`string`|`""`| no |
138
137
| group\_role | The role to give the controlling group (group\_name) over the project (defaults to project editor) |`string`|`"roles/editor"`| no |
139
-
| impersonate\_service\_account | An optional service account to impersonate. This cannot be used with credentials\_path. If this service account is not specified and credentials\_path is absent, the module will use Application Default Credentials. |`string`|`""`| no |
140
138
| labels | Map of labels for project |`map(string)`|`{}`| no |
141
139
| lien | Add a lien on the project to prevent accidental deletion |`bool`|`false`| no |
142
140
| name | The name for the project |`string`| n/a | yes |
The v11.0 release of Project Factory is a backwards incompatible release.
4
+
5
+
## Migration Instructions
6
+
7
+
### Unused variables have been removed
8
+
9
+
Variables `credentials_path` and `impersonate_service_account` have been removed as we have removed the need for gcloud and local-execs in [v10.0](https://github.com/terraform-google-modules/terraform-google-project-factory/blob/master/docs/upgrading_to_project_factory_v10.0.md). This change should be no-op.
| credentials\_path | Path to a Service Account credentials file with permissions documented in the readme |`any`| n/a | yes |
33
32
| org\_id | organization id |`any`| n/a | yes |
34
33
| shared\_vpc | The ID of the host project which hosts the shared VPC |`any`| n/a | yes |
35
34
| shared\_vpc\_subnets | List of subnets fully qualified subnet IDs (ie. projects/$PROJECT\_ID/regions/$REGION/subnetworks/$SUBNET\_ID) |`list(string)`|`[]`| no |
| admin\_email | Admin user email on Gsuite |`any`| n/a | yes |
29
29
| billing\_account | The ID of the billing account to associate this project with |`any`| n/a | yes |
30
-
| credentials\_path | Path to a service account credentials file with rights to run the Project Factory. If this file is absent Terraform will fall back to Application Default Credentials. |`string`|`""`| no |
31
30
| organization\_id | The organization id for the associated services |`any`| n/a | yes |
Copy file name to clipboardexpand all lines: examples/project-hierarchy/variables.tf
-5
Original file line number
Diff line number
Diff line change
@@ -26,8 +26,3 @@ variable "billing_account" {
26
26
description="The ID of the billing account to associate this project with"
27
27
}
28
28
29
-
variable"credentials_path" {
30
-
description="Path to a service account credentials file with rights to run the Project Factory. If this file is absent Terraform will fall back to Application Default Credentials."
| billing\_account | The ID of the billing account to associate this project with |`any`| n/a | yes |
17
-
| credentials\_path | Path to a service account credentials file with rights to run the Project Factory. If this file is absent Terraform will fall back to Application Default Credentials. |`string`|`""`| no |
18
17
| organization\_id | The organization id for the associated services |`any`| n/a | yes |
Copy file name to clipboardexpand all lines: examples/simple_project/variables.tf
-5
Original file line number
Diff line number
Diff line change
@@ -21,8 +21,3 @@ variable "organization_id" {
21
21
variable"billing_account" {
22
22
description="The ID of the billing account to associate this project with"
23
23
}
24
-
25
-
variable"credentials_path" {
26
-
description="Path to a service account credentials file with rights to run the Project Factory. If this file is absent Terraform will fall back to Application Default Credentials."
description="Path to a service account credentials file with rights to run the Project Factory. If this file is absent Terraform will fall back to Application Default Credentials."
132
-
type=string
133
-
default=""
134
-
}
135
-
136
-
variable"impersonate_service_account" {
137
-
description="An optional service account to impersonate. If this service account is not specified, Terraform will fall back to credential file or Application Default Credentials."
138
-
type=string
139
-
default=""
140
-
}
141
-
142
130
variable"shared_vpc_subnets" {
143
131
description="List of subnets fully qualified subnet IDs (ie. projects/$project_id/regions/$region/subnetworks/$subnet_id)"
@@ -73,7 +72,6 @@ The roles granted are specifically:
73
72
| consumer\_quotas | The quotas configuration you want to override for the project. | <pre>list(object({<br> service = string,<br> metric = string,<br> limit = string,<br> value = string,<br> }))</pre> |`[]`| no |
74
73
| create\_group | Whether to create the group or not |`bool`|`false`| no |
75
74
| create\_project\_sa | Whether the default service account for the project shall be created |`bool`|`true`| no |
76
-
| credentials\_path | Path to a service account credentials file with rights to run the Project Factory. If this file is absent Terraform will fall back to Application Default Credentials. |`string`|`""`| no |
77
75
| default\_service\_account | Project default service account setting: can be one of `delete`, `deprivilege`, `disable`, or `keep`. |`string`|`"disable"`| no |
78
76
| disable\_dependent\_services | Whether services that are enabled and which depend on this service should also be disabled when this service is destroyed. |`bool`|`true`| no |
79
77
| disable\_services\_on\_destroy | Whether project services will be disabled when the resources are destroyed |`bool`|`true`| no |
@@ -83,7 +81,6 @@ The roles granted are specifically:
83
81
| folder\_id | The ID of a folder to host this project |`string`|`""`| no |
84
82
| group\_name | A group to control the project by being assigned group\_role - defaults to ${project\_name}-editors |`string`|`""`| no |
85
83
| group\_role | The role to give the controlling group (group\_name) over the project (defaults to project editor) |`string`|`"roles/editor"`| no |
86
-
| impersonate\_service\_account | An optional service account to impersonate. If this service account is not specified, Terraform will fall back to credential file or Application Default Credentials. |`string`|`""`| no |
87
84
| labels | Map of labels for project |`map(string)`|`{}`| no |
88
85
| lien | Add a lien on the project to prevent accidental deletion |`bool`|`false`| no |
89
86
| name | The name for the project |`any`| n/a | yes |
description="Path to a service account credentials file with rights to run the Project Factory. If this file is absent Terraform will fall back to Application Default Credentials."
117
-
default=""
118
-
}
119
-
120
-
variable"impersonate_service_account" {
121
-
description="An optional service account to impersonate. If this service account is not specified, Terraform will fall back to credential file or Application Default Credentials."
122
-
type=string
123
-
default=""
124
-
}
125
-
126
115
variable"shared_vpc_subnets" {
127
116
description="List of subnets fully qualified subnet IDs (ie. projects/$project_id/regions/$region/subnetworks/$subnet_id)"
Copy file name to clipboardexpand all lines: modules/svpc_service_project/README.md
-2
Original file line number
Diff line number
Diff line change
@@ -44,7 +44,6 @@ module "service-project" {
44
44
| budget\_amount | The amount to use for a budget alert |`number`|`null`| no |
45
45
| budget\_monitoring\_notification\_channels | A list of monitoring notification channels in the form `[projects/{project_id}/notificationChannels/{channel_id}]`. A maximum of 5 channels are allowed. |`list(string)`|`[]`| no |
46
46
| create\_project\_sa | Whether the default service account for the project shall be created |`bool`|`true`| no |
47
-
| credentials\_path | Path to a service account credentials file with rights to run the Project Factory. If this file is absent Terraform will fall back to Application Default Credentials. |`string`|`""`| no |
48
47
| default\_service\_account | Project default service account setting: can be one of `delete`, `deprivilege`, `disable`, or `keep`. |`string`|`"disable"`| no |
49
48
| disable\_dependent\_services | Whether services that are enabled and which depend on this service should also be disabled when this service is destroyed. |`bool`|`true`| no |
50
49
| disable\_services\_on\_destroy | Whether project services will be disabled when the resources are destroyed |`bool`|`true`| no |
@@ -53,7 +52,6 @@ module "service-project" {
53
52
| grant\_services\_security\_admin\_role | Whether or not to grant Kubernetes Engine Service Agent the Security Admin role on the host project so it can manage firewall rules |`bool`|`false`| no |
54
53
| group\_name | A group to control the project by being assigned group\_role (defaults to project editor) |`string`|`""`| no |
55
54
| group\_role | The role to give the controlling group (group\_name) over the project (defaults to project editor) |`string`|`"roles/editor"`| no |
56
-
| impersonate\_service\_account | An optional service account to impersonate. This cannot be used with credentials\_path. If this service account is not specified and credentials\_path is absent, the module will use Application Default Credentials. |`string`|`""`| no |
57
55
| labels | Map of labels for project |`map(string)`|`{}`| no |
58
56
| lien | Add a lien on the project to prevent accidental deletion |`bool`|`false`| no |
59
57
| name | The name for the project |`string`| n/a | yes |
0 commit comments