diff --git a/gen/gkeprivate/GkeprivateConfig.go b/gen/gkeprivate/GkeprivateConfig.go index d4247d3916..ea51b77e1e 100644 --- a/gen/gkeprivate/GkeprivateConfig.go +++ b/gen/gkeprivate/GkeprivateConfig.go @@ -40,7 +40,7 @@ type GkeprivateConfig struct { // (Beta) Configure the Cloud Run load balancer type. // // External by default. Set to `LOAD_BALANCER_TYPE_INTERNAL` to configure as an internal load balancer. - CloudrunLoadBalancerType interface{} `field:"optional" json:"cloudrunLoadBalancerType" yaml:"cloudrunLoadBalancerType"` + CloudrunLoadBalancerType *string `field:"optional" json:"cloudrunLoadBalancerType" yaml:"cloudrunLoadBalancerType"` // Cluster autoscaling configuration. // // See [more details](https://cloud.google.com/kubernetes-engine/docs/reference/rest/v1beta1/projects.locations.clusters#clusterautoscaling) @@ -134,7 +134,7 @@ type GkeprivateConfig struct { EnableNetworkEgressExport *bool `field:"optional" json:"enableNetworkEgressExport" yaml:"enableNetworkEgressExport"` // enabled - Enable the PodSecurityPolicy controller for this cluster. // - // If enabled, pods must be valid under a PodSecurityPolicy to be created. + // If enabled, pods must be valid under a PodSecurityPolicy to be created. Pod Security Policy was removed from GKE clusters with version >= 1.25.0. EnablePodSecurityPolicy *bool `field:"optional" json:"enablePodSecurityPolicy" yaml:"enablePodSecurityPolicy"` // (Beta) Whether the master's internal IP address is used as the cluster endpoint. EnablePrivateEndpoint *bool `field:"optional" json:"enablePrivateEndpoint" yaml:"enablePrivateEndpoint"` @@ -168,9 +168,15 @@ type GkeprivateConfig struct { // Default: 1000. // FirewallPriority *float64 `field:"optional" json:"firewallPriority" yaml:"firewallPriority"` - // (Beta) Whether this cluster should enable the Google Compute Engine Persistent Disk Container Storage Interface (CSI) Driver. + // The gateway api channel of this cluster. + // + // Accepted values are `CHANNEL_STANDARD` and `CHANNEL_DISABLED`. + GatewayApiChannel *string `field:"optional" json:"gatewayApiChannel" yaml:"gatewayApiChannel"` + // Whether this cluster should enable the Google Compute Engine Persistent Disk Container Storage Interface (CSI) Driver. + // Default: true. + // GcePdCsiDriver *bool `field:"optional" json:"gcePdCsiDriver" yaml:"gcePdCsiDriver"` - // (Beta) Whether Backup for GKE agent is enabled for this cluster. + // Whether Backup for GKE agent is enabled for this cluster. GkeBackupAgentConfig *bool `field:"optional" json:"gkeBackupAgentConfig" yaml:"gkeBackupAgentConfig"` // Grants created cluster-specific service account storage.objectViewer and artifactregistry.reader roles. GrantRegistryAccess *bool `field:"optional" json:"grantRegistryAccess" yaml:"grantRegistryAccess"` @@ -250,7 +256,7 @@ type GkeprivateConfig struct { MasterIpv4CidrBlock *string `field:"optional" json:"masterIpv4CidrBlock" yaml:"masterIpv4CidrBlock"` // List of services to monitor: SYSTEM_COMPONENTS, WORKLOADS (provider version >= 3.89.0). Empty list is default GKE configuration. MonitoringEnabledComponents *[]*string `field:"optional" json:"monitoringEnabledComponents" yaml:"monitoringEnabledComponents"` - // (Beta) Configuration for Managed Service for Prometheus. + // Configuration for Managed Service for Prometheus. // // Whether or not the managed collection is enabled. MonitoringEnableManagedPrometheus *bool `field:"optional" json:"monitoringEnableManagedPrometheus" yaml:"monitoringEnableManagedPrometheus"` @@ -297,6 +303,11 @@ type GkeprivateConfig struct { // The property type contains a map, they have special handling, please see {@link cdk.tf /module-map-inputs the docs} // NodePoolsOauthScopes *map[string]*[]*string `field:"optional" json:"nodePoolsOauthScopes" yaml:"nodePoolsOauthScopes"` + // Map of maps containing resource labels by node-pool name. + // Default: [object Object] + // The property type contains a map, they have special handling, please see {@link cdk.tf /module-map-inputs the docs} + // + NodePoolsResourceLabels *map[string]*map[string]*string `field:"optional" json:"nodePoolsResourceLabels" yaml:"nodePoolsResourceLabels"` // Map of lists containing node network tags by node-pool name. // Default: [object Object] // The property type contains a map, they have special handling, please see {@link cdk.tf /module-map-inputs the docs} @@ -329,7 +340,9 @@ type GkeprivateConfig struct { RegistryProjectIds *[]*string `field:"optional" json:"registryProjectIds" yaml:"registryProjectIds"` // The release channel of this cluster. // - // Accepted values are `UNSPECIFIED`, `RAPID`, `REGULAR` and `STABLE`. Defaults to `UNSPECIFIED`. + // Accepted values are `UNSPECIFIED`, `RAPID`, `REGULAR` and `STABLE`. Defaults to `REGULAR`. + // Default: REGULAR. + // ReleaseChannel *string `field:"optional" json:"releaseChannel" yaml:"releaseChannel"` // Remove default node pool while setting up the cluster. RemoveDefaultNodePool *bool `field:"optional" json:"removeDefaultNodePool" yaml:"removeDefaultNodePool"` @@ -339,20 +352,26 @@ type GkeprivateConfig struct { SandboxEnabled *bool `field:"optional" json:"sandboxEnabled" yaml:"sandboxEnabled"` // The service account to run nodes as if not overridden in `node_pools`. // - // The create_service_account variable default value (true) will cause a cluster-specific service account to be created. + // The create_service_account variable default value (true) will cause a cluster-specific service account to be created. This service account should already exists and it will be used by the node pools. If you wish to only override the service account name, you can use service_account_name variable. ServiceAccount *string `field:"optional" json:"serviceAccount" yaml:"serviceAccount"` + // The name of the service account that will be created if create_service_account is true. + // + // If you wish to use an existing service account, use service_account variable. + ServiceAccountName *string `field:"optional" json:"serviceAccountName" yaml:"serviceAccountName"` // Whether external ips specified by a service will be allowed in this cluster. ServiceExternalIps *bool `field:"optional" json:"serviceExternalIps" yaml:"serviceExternalIps"` + // The log_config for shadow firewall rules. + // + // You can set this variable to `null` to disable logging. + // Default: [object Object]. + // + ShadowFirewallRulesLogConfig interface{} `field:"optional" json:"shadowFirewallRulesLogConfig" yaml:"shadowFirewallRulesLogConfig"` // The firewall priority of GKE shadow firewall rules. // // The priority should be less than default firewall, which is 1000. // Default: 999. // ShadowFirewallRulesPriority *float64 `field:"optional" json:"shadowFirewallRulesPriority" yaml:"shadowFirewallRulesPriority"` - // Flag to skip all local-exec provisioners. - // - // It breaks `stub_domains` and `upstream_nameservers` variables functionality. - SkipProvisioners *bool `field:"optional" json:"skipProvisioners" yaml:"skipProvisioners"` // Map of stub domains and their resolvers to forward DNS queries for a certain domain to an external DNS server. // Default: [object Object] // The property type contains a map, they have special handling, please see {@link cdk.tf /module-map-inputs the docs} diff --git a/gen/gkeprivate/Gkeprivate__checks.go b/gen/gkeprivate/Gkeprivate__checks.go index 59ce3485ca..90948c062d 100644 --- a/gen/gkeprivate/Gkeprivate__checks.go +++ b/gen/gkeprivate/Gkeprivate__checks.go @@ -90,7 +90,7 @@ func validateGkeprivate_IsTerraformElementParameters(x interface{}) error { return nil } -func (j *jsiiProxy_Gkeprivate) validateSetCloudrunLoadBalancerTypeParameters(val interface{}) error { +func (j *jsiiProxy_Gkeprivate) validateSetClusterAutoscalingParameters(val interface{}) error { if val == nil { return fmt.Errorf("parameter val is required, but nil was provided") } @@ -98,7 +98,7 @@ func (j *jsiiProxy_Gkeprivate) validateSetCloudrunLoadBalancerTypeParameters(val return nil } -func (j *jsiiProxy_Gkeprivate) validateSetClusterAutoscalingParameters(val interface{}) error { +func (j *jsiiProxy_Gkeprivate) validateSetIpRangePodsParameters(val *string) error { if val == nil { return fmt.Errorf("parameter val is required, but nil was provided") } @@ -106,7 +106,7 @@ func (j *jsiiProxy_Gkeprivate) validateSetClusterAutoscalingParameters(val inter return nil } -func (j *jsiiProxy_Gkeprivate) validateSetIpRangePodsParameters(val *string) error { +func (j *jsiiProxy_Gkeprivate) validateSetIpRangeServicesParameters(val *string) error { if val == nil { return fmt.Errorf("parameter val is required, but nil was provided") } @@ -114,7 +114,7 @@ func (j *jsiiProxy_Gkeprivate) validateSetIpRangePodsParameters(val *string) err return nil } -func (j *jsiiProxy_Gkeprivate) validateSetIpRangeServicesParameters(val *string) error { +func (j *jsiiProxy_Gkeprivate) validateSetNameParameters(val *string) error { if val == nil { return fmt.Errorf("parameter val is required, but nil was provided") } @@ -122,7 +122,7 @@ func (j *jsiiProxy_Gkeprivate) validateSetIpRangeServicesParameters(val *string) return nil } -func (j *jsiiProxy_Gkeprivate) validateSetNameParameters(val *string) error { +func (j *jsiiProxy_Gkeprivate) validateSetNetworkParameters(val *string) error { if val == nil { return fmt.Errorf("parameter val is required, but nil was provided") } @@ -130,7 +130,7 @@ func (j *jsiiProxy_Gkeprivate) validateSetNameParameters(val *string) error { return nil } -func (j *jsiiProxy_Gkeprivate) validateSetNetworkParameters(val *string) error { +func (j *jsiiProxy_Gkeprivate) validateSetProjectIdParameters(val *string) error { if val == nil { return fmt.Errorf("parameter val is required, but nil was provided") } @@ -138,7 +138,7 @@ func (j *jsiiProxy_Gkeprivate) validateSetNetworkParameters(val *string) error { return nil } -func (j *jsiiProxy_Gkeprivate) validateSetProjectIdParameters(val *string) error { +func (j *jsiiProxy_Gkeprivate) validateSetShadowFirewallRulesLogConfigParameters(val interface{}) error { if val == nil { return fmt.Errorf("parameter val is required, but nil was provided") } diff --git a/gen/gkeprivate/Gkeprivate__no_checks.go b/gen/gkeprivate/Gkeprivate__no_checks.go index 5830123616..6755ebf56b 100644 --- a/gen/gkeprivate/Gkeprivate__no_checks.go +++ b/gen/gkeprivate/Gkeprivate__no_checks.go @@ -32,10 +32,6 @@ func validateGkeprivate_IsTerraformElementParameters(x interface{}) error { return nil } -func (j *jsiiProxy_Gkeprivate) validateSetCloudrunLoadBalancerTypeParameters(val interface{}) error { - return nil -} - func (j *jsiiProxy_Gkeprivate) validateSetClusterAutoscalingParameters(val interface{}) error { return nil } @@ -60,6 +56,10 @@ func (j *jsiiProxy_Gkeprivate) validateSetProjectIdParameters(val *string) error return nil } +func (j *jsiiProxy_Gkeprivate) validateSetShadowFirewallRulesLogConfigParameters(val interface{}) error { + return nil +} + func (j *jsiiProxy_Gkeprivate) validateSetSubnetworkParameters(val *string) error { return nil } diff --git a/gen/gkeprivate/gkeprivate.go b/gen/gkeprivate/gkeprivate.go index d69a86e4a4..644689c156 100644 --- a/gen/gkeprivate/gkeprivate.go +++ b/gen/gkeprivate/gkeprivate.go @@ -25,8 +25,8 @@ type Gkeprivate interface { Cloudrun() *bool SetCloudrun(val *bool) CloudrunEnabledOutput() *string - CloudrunLoadBalancerType() interface{} - SetCloudrunLoadBalancerType(val interface{}) + CloudrunLoadBalancerType() *string + SetCloudrunLoadBalancerType(val *string) ClusterAutoscaling() interface{} SetClusterAutoscaling(val interface{}) ClusterDnsDomain() *string @@ -116,6 +116,9 @@ type Gkeprivate interface { Fqn() *string // Experimental. FriendlyUniqueId() *string + GatewayApiChannel() *string + SetGatewayApiChannel(val *string) + GatewayApiChannelOutput() *string GcePdCsiDriver() *bool SetGcePdCsiDriver(val *bool) GkeBackupAgentConfig() *bool @@ -213,6 +216,8 @@ type Gkeprivate interface { NodePoolsNamesOutput() *string NodePoolsOauthScopes() *map[string]*[]*string SetNodePoolsOauthScopes(val *map[string]*[]*string) + NodePoolsResourceLabels() *map[string]*map[string]*string + SetNodePoolsResourceLabels(val *map[string]*map[string]*string) NodePoolsTags() *map[string]*[]*string SetNodePoolsTags(val *map[string]*[]*string) NodePoolsTaints() *map[string]*[]interface{} @@ -248,15 +253,17 @@ type Gkeprivate interface { SetSandboxEnabled(val *bool) ServiceAccount() *string SetServiceAccount(val *string) + ServiceAccountName() *string + SetServiceAccountName(val *string) ServiceAccountOutput() *string ServiceExternalIps() *bool SetServiceExternalIps(val *bool) + ShadowFirewallRulesLogConfig() interface{} + SetShadowFirewallRulesLogConfig(val interface{}) ShadowFirewallRulesPriority() *float64 SetShadowFirewallRulesPriority(val *float64) // Experimental. SkipAssetCreationFromLocalModules() *bool - SkipProvisioners() *bool - SetSkipProvisioners(val *bool) // Experimental. Source() *string StubDomains() *map[string]*[]*string @@ -385,8 +392,8 @@ func (j *jsiiProxy_Gkeprivate) CloudrunEnabledOutput() *string { return returns } -func (j *jsiiProxy_Gkeprivate) CloudrunLoadBalancerType() interface{} { - var returns interface{} +func (j *jsiiProxy_Gkeprivate) CloudrunLoadBalancerType() *string { + var returns *string _jsii_.Get( j, "cloudrunLoadBalancerType", @@ -835,6 +842,26 @@ func (j *jsiiProxy_Gkeprivate) FriendlyUniqueId() *string { return returns } +func (j *jsiiProxy_Gkeprivate) GatewayApiChannel() *string { + var returns *string + _jsii_.Get( + j, + "gatewayApiChannel", + &returns, + ) + return returns +} + +func (j *jsiiProxy_Gkeprivate) GatewayApiChannelOutput() *string { + var returns *string + _jsii_.Get( + j, + "gatewayApiChannelOutput", + &returns, + ) + return returns +} + func (j *jsiiProxy_Gkeprivate) GcePdCsiDriver() *bool { var returns *bool _jsii_.Get( @@ -1405,6 +1432,16 @@ func (j *jsiiProxy_Gkeprivate) NodePoolsOauthScopes() *map[string]*[]*string { return returns } +func (j *jsiiProxy_Gkeprivate) NodePoolsResourceLabels() *map[string]*map[string]*string { + var returns *map[string]*map[string]*string + _jsii_.Get( + j, + "nodePoolsResourceLabels", + &returns, + ) + return returns +} + func (j *jsiiProxy_Gkeprivate) NodePoolsTags() *map[string]*[]*string { var returns *map[string]*[]*string _jsii_.Get( @@ -1605,6 +1642,16 @@ func (j *jsiiProxy_Gkeprivate) ServiceAccount() *string { return returns } +func (j *jsiiProxy_Gkeprivate) ServiceAccountName() *string { + var returns *string + _jsii_.Get( + j, + "serviceAccountName", + &returns, + ) + return returns +} + func (j *jsiiProxy_Gkeprivate) ServiceAccountOutput() *string { var returns *string _jsii_.Get( @@ -1625,31 +1672,31 @@ func (j *jsiiProxy_Gkeprivate) ServiceExternalIps() *bool { return returns } -func (j *jsiiProxy_Gkeprivate) ShadowFirewallRulesPriority() *float64 { - var returns *float64 +func (j *jsiiProxy_Gkeprivate) ShadowFirewallRulesLogConfig() interface{} { + var returns interface{} _jsii_.Get( j, - "shadowFirewallRulesPriority", + "shadowFirewallRulesLogConfig", &returns, ) return returns } -func (j *jsiiProxy_Gkeprivate) SkipAssetCreationFromLocalModules() *bool { - var returns *bool +func (j *jsiiProxy_Gkeprivate) ShadowFirewallRulesPriority() *float64 { + var returns *float64 _jsii_.Get( j, - "skipAssetCreationFromLocalModules", + "shadowFirewallRulesPriority", &returns, ) return returns } -func (j *jsiiProxy_Gkeprivate) SkipProvisioners() *bool { +func (j *jsiiProxy_Gkeprivate) SkipAssetCreationFromLocalModules() *bool { var returns *bool _jsii_.Get( j, - "skipProvisioners", + "skipAssetCreationFromLocalModules", &returns, ) return returns @@ -1843,10 +1890,7 @@ func (j *jsiiProxy_Gkeprivate)SetCloudrun(val *bool) { ) } -func (j *jsiiProxy_Gkeprivate)SetCloudrunLoadBalancerType(val interface{}) { - if err := j.validateSetCloudrunLoadBalancerTypeParameters(val); err != nil { - panic(err) - } +func (j *jsiiProxy_Gkeprivate)SetCloudrunLoadBalancerType(val *string) { _jsii_.Set( j, "cloudrunLoadBalancerType", @@ -2161,6 +2205,14 @@ func (j *jsiiProxy_Gkeprivate)SetForEach(val cdktf.ITerraformIterator) { ) } +func (j *jsiiProxy_Gkeprivate)SetGatewayApiChannel(val *string) { + _jsii_.Set( + j, + "gatewayApiChannel", + val, + ) +} + func (j *jsiiProxy_Gkeprivate)SetGcePdCsiDriver(val *bool) { _jsii_.Set( j, @@ -2485,6 +2537,14 @@ func (j *jsiiProxy_Gkeprivate)SetNodePoolsOauthScopes(val *map[string]*[]*string ) } +func (j *jsiiProxy_Gkeprivate)SetNodePoolsResourceLabels(val *map[string]*map[string]*string) { + _jsii_.Set( + j, + "nodePoolsResourceLabels", + val, + ) +} + func (j *jsiiProxy_Gkeprivate)SetNodePoolsTags(val *map[string]*[]*string) { _jsii_.Set( j, @@ -2592,6 +2652,14 @@ func (j *jsiiProxy_Gkeprivate)SetServiceAccount(val *string) { ) } +func (j *jsiiProxy_Gkeprivate)SetServiceAccountName(val *string) { + _jsii_.Set( + j, + "serviceAccountName", + val, + ) +} + func (j *jsiiProxy_Gkeprivate)SetServiceExternalIps(val *bool) { _jsii_.Set( j, @@ -2600,18 +2668,21 @@ func (j *jsiiProxy_Gkeprivate)SetServiceExternalIps(val *bool) { ) } -func (j *jsiiProxy_Gkeprivate)SetShadowFirewallRulesPriority(val *float64) { +func (j *jsiiProxy_Gkeprivate)SetShadowFirewallRulesLogConfig(val interface{}) { + if err := j.validateSetShadowFirewallRulesLogConfigParameters(val); err != nil { + panic(err) + } _jsii_.Set( j, - "shadowFirewallRulesPriority", + "shadowFirewallRulesLogConfig", val, ) } -func (j *jsiiProxy_Gkeprivate)SetSkipProvisioners(val *bool) { +func (j *jsiiProxy_Gkeprivate)SetShadowFirewallRulesPriority(val *float64) { _jsii_.Set( j, - "skipProvisioners", + "shadowFirewallRulesPriority", val, ) } diff --git a/gen/gkeprivate/jsii/cdktf-provider-gkeprivate-0.0.1.tgz b/gen/gkeprivate/jsii/cdktf-provider-gkeprivate-0.0.1.tgz index 0771decfd7..e393207543 100644 Binary files a/gen/gkeprivate/jsii/cdktf-provider-gkeprivate-0.0.1.tgz and b/gen/gkeprivate/jsii/cdktf-provider-gkeprivate-0.0.1.tgz differ diff --git a/gen/gkeprivate/main.go b/gen/gkeprivate/main.go index f2c15edea4..34c8fc5f97 100644 --- a/gen/gkeprivate/main.go +++ b/gen/gkeprivate/main.go @@ -67,6 +67,8 @@ func init() { _jsii_.MemberProperty{JsiiProperty: "forEach", GoGetter: "ForEach"}, _jsii_.MemberProperty{JsiiProperty: "fqn", GoGetter: "Fqn"}, _jsii_.MemberProperty{JsiiProperty: "friendlyUniqueId", GoGetter: "FriendlyUniqueId"}, + _jsii_.MemberProperty{JsiiProperty: "gatewayApiChannel", GoGetter: "GatewayApiChannel"}, + _jsii_.MemberProperty{JsiiProperty: "gatewayApiChannelOutput", GoGetter: "GatewayApiChannelOutput"}, _jsii_.MemberProperty{JsiiProperty: "gcePdCsiDriver", GoGetter: "GcePdCsiDriver"}, _jsii_.MemberMethod{JsiiMethod: "getString", GoMethod: "GetString"}, _jsii_.MemberProperty{JsiiProperty: "gkeBackupAgentConfig", GoGetter: "GkeBackupAgentConfig"}, @@ -126,6 +128,7 @@ func init() { _jsii_.MemberProperty{JsiiProperty: "nodePoolsMetadata", GoGetter: "NodePoolsMetadata"}, _jsii_.MemberProperty{JsiiProperty: "nodePoolsNamesOutput", GoGetter: "NodePoolsNamesOutput"}, _jsii_.MemberProperty{JsiiProperty: "nodePoolsOauthScopes", GoGetter: "NodePoolsOauthScopes"}, + _jsii_.MemberProperty{JsiiProperty: "nodePoolsResourceLabels", GoGetter: "NodePoolsResourceLabels"}, _jsii_.MemberProperty{JsiiProperty: "nodePoolsTags", GoGetter: "NodePoolsTags"}, _jsii_.MemberProperty{JsiiProperty: "nodePoolsTaints", GoGetter: "NodePoolsTaints"}, _jsii_.MemberProperty{JsiiProperty: "nodePoolsVersionsOutput", GoGetter: "NodePoolsVersionsOutput"}, @@ -148,11 +151,12 @@ func init() { _jsii_.MemberProperty{JsiiProperty: "resourceUsageExportDatasetId", GoGetter: "ResourceUsageExportDatasetId"}, _jsii_.MemberProperty{JsiiProperty: "sandboxEnabled", GoGetter: "SandboxEnabled"}, _jsii_.MemberProperty{JsiiProperty: "serviceAccount", GoGetter: "ServiceAccount"}, + _jsii_.MemberProperty{JsiiProperty: "serviceAccountName", GoGetter: "ServiceAccountName"}, _jsii_.MemberProperty{JsiiProperty: "serviceAccountOutput", GoGetter: "ServiceAccountOutput"}, _jsii_.MemberProperty{JsiiProperty: "serviceExternalIps", GoGetter: "ServiceExternalIps"}, + _jsii_.MemberProperty{JsiiProperty: "shadowFirewallRulesLogConfig", GoGetter: "ShadowFirewallRulesLogConfig"}, _jsii_.MemberProperty{JsiiProperty: "shadowFirewallRulesPriority", GoGetter: "ShadowFirewallRulesPriority"}, _jsii_.MemberProperty{JsiiProperty: "skipAssetCreationFromLocalModules", GoGetter: "SkipAssetCreationFromLocalModules"}, - _jsii_.MemberProperty{JsiiProperty: "skipProvisioners", GoGetter: "SkipProvisioners"}, _jsii_.MemberProperty{JsiiProperty: "source", GoGetter: "Source"}, _jsii_.MemberProperty{JsiiProperty: "stubDomains", GoGetter: "StubDomains"}, _jsii_.MemberProperty{JsiiProperty: "subnetwork", GoGetter: "Subnetwork"}, diff --git a/gkeprivate.yml b/gkeprivate.yml index 9c7ac5e10a..907e21465a 100644 --- a/gkeprivate.yml +++ b/gkeprivate.yml @@ -1,8 +1,12 @@ name: gkeprivate module: - source: terraform-google-modules/kubernetes-engine/google//modules/beta-private-cluster - version: "24.0.0" + # TODO(@michaellzc): + # - https://github.com/terraform-google-modules/terraform-google-kubernetes-engine/pull/1806 + # cherry pick to v26.1.1 at https://github.com/michaellzc/terraform-google-kubernetes-engine/tree/fork-26-1-1 + # source: terraform-google-modules/kubernetes-engine/google//modules/beta-private-cluster + # version: "26.1.1" + source: git::https://github.com/michaellzc/terraform-google-kubernetes-engine.git//modules/beta-private-cluster?ref=be869fec0f4494fdaf6b5a36eb0548cb4473df03 target: language: go