Commit Graph

23 Commits

Author SHA1 Message Date
Kubernetes Prow Robot 7b631db949
Merge pull request #16242 from rifelpet/gcp-tf
Bump GCP terraform provider to latest
2024-01-11 05:22:12 +01:00
Peter Rifel eaf4174c54
./hack/update-expected.sh 2024-01-10 19:44:37 -06:00
Ciprian Hacman 67b9148cd9 hack/update-expected.sh 2024-01-10 03:21:57 +02:00
Peter Rifel 62fcb00f8c
./hack/update-expected.sh 2023-12-20 20:06:13 -06:00
Matt Morrison 9f15dd71f0
Update expected test output 2023-10-11 21:07:31 +13:00
justinsb 7814744a7a autogen: Update test data for gce label changes 2023-07-28 23:48:41 -04:00
Kubernetes Prow Robot 141a040aec
Merge pull request #15607 from hakman/gce_cloud-init
gce: Use `user-data` instead of `startup-script` metadata key
2023-07-15 11:47:05 -07:00
justinsb 3613f586c8 GCE: Set firewall rules for Internal LBs also
It seems we can use the exact same rules.
2023-07-09 19:25:42 -04:00
Ciprian Hacman 41c82ee6b4 hack/update-expected.sh 2023-07-09 13:50:00 +03:00
Ciprian Hacman 739c3168e2 hack/update-expected.sh 2023-07-08 04:34:43 +03:00
Tessia Piboubès d41b6e6ca6 GCP Terraform: enable create_before_destroy in instance templates 2023-06-07 17:49:55 +02:00
justinsb 8738f97ca7 Update test output for GCE IPv6 support 2023-03-31 09:55:28 -04:00
justinsb 5dd5865893 Update expected output 2023-01-04 08:14:45 -05:00
Ciprian Hacman 0ff7c6f432 Update GCE integration tests 2022-12-14 11:48:51 +02:00
Ciprian Hacman eded9c1c4b Run hack/update-expected.sh 2022-12-05 00:20:17 +02:00
Ciprian Hacman ba769d6037 Run hack/update-expected.sh 2022-12-04 18:27:47 +02:00
John Gardiner Myers b105aa6a86 hack/update-expected.sh 2022-11-22 17:15:51 -08:00
Ciprian Hacman 407ee77041 Trim space around SSH public key 2022-08-24 08:32:01 +03:00
Ciprian Hacman b9394fed18 Run hack/update-expected.sh 2022-08-12 19:40:25 +03:00
Ivan Volynkin 329c60cc62 Adding GCE SPOT support 2022-07-14 20:19:50 +03:00
Ciprian Hacman 79be7cb1cd Run hack/update-expected.sh 2022-06-23 20:55:26 +03:00
Ciprian Hacman 911f4a133c Run hack/update-expected.sh 2022-06-10 14:03:16 +03:00
Nat Henderson 9b08c4bb51 Enable internal load balancers when running on GCP
* Add ILBs, broadly following the AWS model.  The following new
capabilities are added for clusters in GCP:
  * Cluster's spec.api.loadBalancer can be set to 'type: internal' on
    GCP.
    * Therefore, GCP can now create:
        * regional backend services
        * regional (non-legacy) healthchecks
        * firewall rules with "internal" load-balancing scheme
        * firewall rules with dot-notation-specified IP addresses
  * Cluster's spec.api.loadBalancer's 'subnets' field functions
    as in the AWS model.

A few incidental changes are included, either because this change
touched the relevant code or because my use case happened to trigger the
issues that are fixed here.

* Cluster's spec.networkID field can be prefixed by project to use
  GCP's common cross-project networking model.
    * The presumption is that all specified subnets belong to this
      network and therefore this project.

* Add missing operation wait on forwarding rule creation.

* Some Terraform output improvements:
    * Permit no-ACL files in GCS buckets in Terraform output.
    * Enable marginally better cross-resource reference in Terraform outputs
    * Add project to network + subnetwork literals in Terraform output.
    * Add terraform output to backend services and health checks.

Testing:
  * Add mocks for backend services and health checks.
  * Add minimal integration test - copied from gce_private and ilb added.
  * Add update cluster goldens.

Co-authored-by: Travis Reid <travis_reid@apple.com>
2022-04-25 13:31:47 -07:00