Skip to content

Commit

Permalink
fix(cai): modules must not define providers (#1132)
Browse files Browse the repository at this point in the history
Co-authored-by: Daniel Andrade <dandrade@ciandt.com>
Co-authored-by: eeaton <ellioteaton@gmail.com>
  • Loading branch information
3 people committed May 21, 2024
1 parent 229e53c commit f396741
Show file tree
Hide file tree
Showing 4 changed files with 6 additions and 39 deletions.
13 changes: 6 additions & 7 deletions 1-org/envs/shared/cai_monitoring.tf
Original file line number Diff line number Diff line change
Expand Up @@ -28,11 +28,10 @@ module "kms" {
module "cai_monitoring" {
source = "../../modules/cai-monitoring"

org_id = local.org_id
billing_account = local.billing_account
project_id = module.scc_notifications.project_id
location = local.default_region
enable_cmek = true
encryption_key = module.kms.keys["key-cai-monitoring"]
impersonate_sa_email = local.org_step_terraform_service_account_email
org_id = local.org_id
billing_account = local.billing_account
project_id = module.scc_notifications.project_id
location = local.default_region
enable_cmek = true
encryption_key = module.kms.keys["key-cai-monitoring"]
}
2 changes: 0 additions & 2 deletions 1-org/modules/cai-monitoring/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,6 @@ module "secure_cai_notification" {
region = <REGION>
encryption_key = <CMEK KEY>
labels = <LABELS>
impersonate_sa_email = <SA TO IMPERSONATE>
roles_to_monitor = <ROLES TO MONITOR>
}
```
Expand All @@ -26,7 +25,6 @@ module "secure_cai_notification" {
| billing\_account | The ID of the billing account to associate projects with. | `string` | n/a | yes |
| enable\_cmek | The KMS Key to Encrypt Artifact Registry repository, Cloud Storage Bucket and Pub/Sub. | `bool` | `false` | no |
| encryption\_key | The KMS Key to Encrypt Artifact Registry repository, Cloud Storage Bucket and Pub/Sub. | `string` | `null` | no |
| impersonate\_sa\_email | The Service Account email who will execute terraform code. | `string` | n/a | yes |
| labels | Labels to be assigned to resources. | `map(any)` | `{}` | no |
| location | Default location to create resources where applicable. | `string` | `"us-central1"` | no |
| org\_id | GCP Organization ID | `string` | n/a | yes |
Expand Down
25 changes: 0 additions & 25 deletions 1-org/modules/cai-monitoring/providers.tf

This file was deleted.

5 changes: 0 additions & 5 deletions 1-org/modules/cai-monitoring/variables.tf
Original file line number Diff line number Diff line change
Expand Up @@ -53,11 +53,6 @@ variable "labels" {
default = {}
}

variable "impersonate_sa_email" {
description = "The Service Account email who will execute terraform code."
type = string
}

variable "roles_to_monitor" {
description = "List of roles that will save a SCC Finding if granted to any member (service account, user or group) on an update in the IAM Policy."
type = list(string)
Expand Down

0 comments on commit f396741

Please sign in to comment.