You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
BREAKING CHANGE: Some unused variables were removed. See the upgrade guide for details.
BREAKING CHANGE: Buckets now enable uniform bucket-level access by default. See the upgrade guide for details.
Copy file name to clipboardExpand all lines: README.md
-2Lines changed: 0 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -126,7 +126,6 @@ determining that location is as follows:
126
126
| budget\_monitoring\_notification\_channels | A list of monitoring notification channels in the form `[projects/{project_id}/notificationChannels/{channel_id}]`. A maximum of 5 channels are allowed. |`list(string)`|`[]`| no |
127
127
| consumer\_quotas | The quotas configuration you want to override for the project. | <pre>list(object({<br> service = string,<br> metric = string,<br> limit = string,<br> value = string,<br> }))</pre> |`[]`| no |
128
128
| create\_project\_sa | Whether the default service account for the project shall be created |`bool`|`true`| no |
129
-
| credentials\_path | Path to a service account credentials file with rights to run the Project Factory. If this file is absent Terraform will fall back to Application Default Credentials. |`string`|`""`| no |
130
129
| default\_service\_account | Project default service account setting: can be one of `delete`, `deprivilege`, `disable`, or `keep`. |`string`|`"disable"`| no |
131
130
| disable\_dependent\_services | Whether services that are enabled and which depend on this service should also be disabled when this service is destroyed. |`bool`|`true`| no |
132
131
| disable\_services\_on\_destroy | Whether project services will be disabled when the resources are destroyed |`bool`|`true`| no |
@@ -136,7 +135,6 @@ determining that location is as follows:
136
135
| grant\_services\_security\_admin\_role | Whether or not to grant Kubernetes Engine Service Agent the Security Admin role on the host project so it can manage firewall rules |`bool`|`false`| no |
137
136
| group\_name | A group to control the project by being assigned group\_role (defaults to project editor) |`string`|`""`| no |
138
137
| group\_role | The role to give the controlling group (group\_name) over the project (defaults to project editor) |`string`|`"roles/editor"`| no |
139
-
| impersonate\_service\_account | An optional service account to impersonate. This cannot be used with credentials\_path. If this service account is not specified and credentials\_path is absent, the module will use Application Default Credentials. |`string`|`""`| no |
140
138
| labels | Map of labels for project |`map(string)`|`{}`| no |
141
139
| lien | Add a lien on the project to prevent accidental deletion |`bool`|`false`| no |
142
140
| name | The name for the project |`string`| n/a | yes |
The v11.0 release of Project Factory is a backwards incompatible release.
4
+
5
+
## Migration Instructions
6
+
7
+
### Unused variables have been removed
8
+
9
+
Variables `credentials_path` and `impersonate_service_account` have been removed as we have removed the need for gcloud and local-execs in [v10.0](https://github.com/terraform-google-modules/terraform-google-project-factory/blob/master/docs/upgrading_to_project_factory_v10.0.md). This change should be no-op.
| credentials\_path | Path to a Service Account credentials file with permissions documented in the readme |`any`| n/a | yes |
33
32
| org\_id | organization id |`any`| n/a | yes |
34
33
| shared\_vpc | The ID of the host project which hosts the shared VPC |`any`| n/a | yes |
35
34
| shared\_vpc\_subnets | List of subnets fully qualified subnet IDs (ie. projects/$PROJECT\_ID/regions/$REGION/subnetworks/$SUBNET\_ID) |`list(string)`|`[]`| no |
| admin\_email | Admin user email on Gsuite |`any`| n/a | yes |
29
29
| billing\_account | The ID of the billing account to associate this project with |`any`| n/a | yes |
30
-
| credentials\_path | Path to a service account credentials file with rights to run the Project Factory. If this file is absent Terraform will fall back to Application Default Credentials. |`string`|`""`| no |
31
30
| organization\_id | The organization id for the associated services |`any`| n/a | yes |
0 commit comments