Skip to content

Commit

Permalink
code review changes
Browse files Browse the repository at this point in the history
  • Loading branch information
arthurlapertosa committed Sep 10, 2024
1 parent bcb007b commit 4cd4aec
Show file tree
Hide file tree
Showing 2 changed files with 2 additions and 1 deletion.
1 change: 1 addition & 0 deletions examples/confidential_computing/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -5,6 +5,7 @@ encrypted disk using a multiregion (US by default) Cloud HSM key
and a custom service account with cloud-platform scope. It also
creates org policies enforcing the use of CMEK encrypted instances
and confidential computing to all newly created VMs within the project.
Note: existing VM instances won't be affected by the new org policy.

<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
## Inputs
Expand Down
2 changes: 1 addition & 1 deletion examples/confidential_computing/org_policies.tf
Original file line number Diff line number Diff line change
Expand Up @@ -28,7 +28,7 @@ module "confidential-computing-org-policy" {

module "enforce-cmek-org-policy" {
source = "terraform-google-modules/org-policy/google"
version = "~> 5.1"
version = "~> 5.3"

project_id = var.project_id
policy_for = "project"
Expand Down

0 comments on commit 4cd4aec

Please sign in to comment.