diff --git a/.gitignore b/.gitignore index b2df77f4e..4b95eb081 100644 --- a/.gitignore +++ b/.gitignore @@ -95,6 +95,7 @@ dmypy.json # Local .terraform directories **/.terraform/* .terraform/ +.tfshared/ # State files *.tfstate diff --git a/inputs/gcp/Firebase/android_app/deletion_policy/.terraform.lock.hcl b/inputs/gcp/Firebase/android_app/deletion_policy/.terraform.lock.hcl index f7b27c74c..314d1ac32 100644 --- a/inputs/gcp/Firebase/android_app/deletion_policy/.terraform.lock.hcl +++ b/inputs/gcp/Firebase/android_app/deletion_policy/.terraform.lock.hcl @@ -5,6 +5,7 @@ provider "registry.terraform.io/hashicorp/google-beta" { version = "6.32.0" constraints = "6.32.0" hashes = [ + "h1:bHOC05jtVryh3vdkvHwBzJoul6nEfkNJpQhGpX6A6zo=", "h1:q1wVVJxErAaZYuaIPn++kwLXTt5yb40xXW4vcCZgY1I=", "zh:1400bed0826b572048eaacb310937e0c954c85b7e7ad1d4d44620b1e06a42eb3", "zh:1b2a3d2b10a4301048b0307df20fc353e39287de0754e95753c1f63f73d11386", diff --git a/inputs/gcp/Firebase/apple_app/deletion_policy/.terraform.lock.hcl b/inputs/gcp/Firebase/apple_app/deletion_policy/.terraform.lock.hcl index f7b27c74c..314d1ac32 100644 --- a/inputs/gcp/Firebase/apple_app/deletion_policy/.terraform.lock.hcl +++ b/inputs/gcp/Firebase/apple_app/deletion_policy/.terraform.lock.hcl @@ -5,6 +5,7 @@ provider "registry.terraform.io/hashicorp/google-beta" { version = "6.32.0" constraints = "6.32.0" hashes = [ + "h1:bHOC05jtVryh3vdkvHwBzJoul6nEfkNJpQhGpX6A6zo=", "h1:q1wVVJxErAaZYuaIPn++kwLXTt5yb40xXW4vcCZgY1I=", "zh:1400bed0826b572048eaacb310937e0c954c85b7e7ad1d4d44620b1e06a42eb3", "zh:1b2a3d2b10a4301048b0307df20fc353e39287de0754e95753c1f63f73d11386", diff --git a/inputs/gcp/Firebase/web_app/deletion_policy/.terraform.lock.hcl b/inputs/gcp/Firebase/web_app/deletion_policy/.terraform.lock.hcl index f7b27c74c..314d1ac32 100644 --- a/inputs/gcp/Firebase/web_app/deletion_policy/.terraform.lock.hcl +++ b/inputs/gcp/Firebase/web_app/deletion_policy/.terraform.lock.hcl @@ -5,6 +5,7 @@ provider "registry.terraform.io/hashicorp/google-beta" { version = "6.32.0" constraints = "6.32.0" hashes = [ + "h1:bHOC05jtVryh3vdkvHwBzJoul6nEfkNJpQhGpX6A6zo=", "h1:q1wVVJxErAaZYuaIPn++kwLXTt5yb40xXW4vcCZgY1I=", "zh:1400bed0826b572048eaacb310937e0c954c85b7e7ad1d4d44620b1e06a42eb3", "zh:1b2a3d2b10a4301048b0307df20fc353e39287de0754e95753c1f63f73d11386", diff --git a/inputs/gcp/Firebase_Data_Connect/data_connect_service/deletion_policy/.terraform.lock.hcl b/inputs/gcp/Firebase_Data_Connect/data_connect_service/deletion_policy/.terraform.lock.hcl index f7b27c74c..314d1ac32 100644 --- a/inputs/gcp/Firebase_Data_Connect/data_connect_service/deletion_policy/.terraform.lock.hcl +++ b/inputs/gcp/Firebase_Data_Connect/data_connect_service/deletion_policy/.terraform.lock.hcl @@ -5,6 +5,7 @@ provider "registry.terraform.io/hashicorp/google-beta" { version = "6.32.0" constraints = "6.32.0" hashes = [ + "h1:bHOC05jtVryh3vdkvHwBzJoul6nEfkNJpQhGpX6A6zo=", "h1:q1wVVJxErAaZYuaIPn++kwLXTt5yb40xXW4vcCZgY1I=", "zh:1400bed0826b572048eaacb310937e0c954c85b7e7ad1d4d44620b1e06a42eb3", "zh:1b2a3d2b10a4301048b0307df20fc353e39287de0754e95753c1f63f73d11386", diff --git a/inputs/gcp/GKEHub/google_gke_hub_feature/fleet_logging_default_mode_required/.terraform.lock.hcl b/inputs/gcp/GKEHub/google_gke_hub_feature/fleet_logging_default_mode_required/.terraform.lock.hcl index 231d34a4b..78ddb99f9 100644 --- a/inputs/gcp/GKEHub/google_gke_hub_feature/fleet_logging_default_mode_required/.terraform.lock.hcl +++ b/inputs/gcp/GKEHub/google_gke_hub_feature/fleet_logging_default_mode_required/.terraform.lock.hcl @@ -4,6 +4,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "7.1.1" hashes = [ + "h1:Hu/Gy8dB7TXsUyswqm6XJhr7esYmXk9Ea/Jo9VgT4LE=", "h1:pQKxKh+bqz7MhpDDPVfEaNXMQtkp3xj3SAeMolfrgpo=", "zh:03ee9fdc0d157a606aba68658de6dc809fc3335cccb7c537373d8643412c1327", "zh:110e8ffe81deb8c203ecf310a15c2dedca1dfc936473a247b8a4f98adebd86f5", diff --git a/inputs/gcp/GKEHub/google_gke_hub_feature_iam_binding/no_public_principals_binding/.terraform.lock.hcl b/inputs/gcp/GKEHub/google_gke_hub_feature_iam_binding/no_public_principals_binding/.terraform.lock.hcl index 231d34a4b..78ddb99f9 100644 --- a/inputs/gcp/GKEHub/google_gke_hub_feature_iam_binding/no_public_principals_binding/.terraform.lock.hcl +++ b/inputs/gcp/GKEHub/google_gke_hub_feature_iam_binding/no_public_principals_binding/.terraform.lock.hcl @@ -4,6 +4,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "7.1.1" hashes = [ + "h1:Hu/Gy8dB7TXsUyswqm6XJhr7esYmXk9Ea/Jo9VgT4LE=", "h1:pQKxKh+bqz7MhpDDPVfEaNXMQtkp3xj3SAeMolfrgpo=", "zh:03ee9fdc0d157a606aba68658de6dc809fc3335cccb7c537373d8643412c1327", "zh:110e8ffe81deb8c203ecf310a15c2dedca1dfc936473a247b8a4f98adebd86f5", diff --git a/inputs/gcp/GKEHub/google_gke_hub_feature_iam_member/no_public_principals_member/.terraform.lock.hcl b/inputs/gcp/GKEHub/google_gke_hub_feature_iam_member/no_public_principals_member/.terraform.lock.hcl index 231d34a4b..78ddb99f9 100644 --- a/inputs/gcp/GKEHub/google_gke_hub_feature_iam_member/no_public_principals_member/.terraform.lock.hcl +++ b/inputs/gcp/GKEHub/google_gke_hub_feature_iam_member/no_public_principals_member/.terraform.lock.hcl @@ -4,6 +4,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "7.1.1" hashes = [ + "h1:Hu/Gy8dB7TXsUyswqm6XJhr7esYmXk9Ea/Jo9VgT4LE=", "h1:pQKxKh+bqz7MhpDDPVfEaNXMQtkp3xj3SAeMolfrgpo=", "zh:03ee9fdc0d157a606aba68658de6dc809fc3335cccb7c537373d8643412c1327", "zh:110e8ffe81deb8c203ecf310a15c2dedca1dfc936473a247b8a4f98adebd86f5", diff --git a/inputs/gcp/GKEHub/google_gke_hub_feature_membership/git_approved_HTTPS/.terraform.lock.hcl b/inputs/gcp/GKEHub/google_gke_hub_feature_membership/git_approved_HTTPS/.terraform.lock.hcl index 231d34a4b..78ddb99f9 100644 --- a/inputs/gcp/GKEHub/google_gke_hub_feature_membership/git_approved_HTTPS/.terraform.lock.hcl +++ b/inputs/gcp/GKEHub/google_gke_hub_feature_membership/git_approved_HTTPS/.terraform.lock.hcl @@ -4,6 +4,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "7.1.1" hashes = [ + "h1:Hu/Gy8dB7TXsUyswqm6XJhr7esYmXk9Ea/Jo9VgT4LE=", "h1:pQKxKh+bqz7MhpDDPVfEaNXMQtkp3xj3SAeMolfrgpo=", "zh:03ee9fdc0d157a606aba68658de6dc809fc3335cccb7c537373d8643412c1327", "zh:110e8ffe81deb8c203ecf310a15c2dedca1dfc936473a247b8a4f98adebd86f5", diff --git a/inputs/gcp/GKEHub/google_gke_hub_feature_membership/git_secure_auth/.terraform.lock.hcl b/inputs/gcp/GKEHub/google_gke_hub_feature_membership/git_secure_auth/.terraform.lock.hcl index 231d34a4b..78ddb99f9 100644 --- a/inputs/gcp/GKEHub/google_gke_hub_feature_membership/git_secure_auth/.terraform.lock.hcl +++ b/inputs/gcp/GKEHub/google_gke_hub_feature_membership/git_secure_auth/.terraform.lock.hcl @@ -4,6 +4,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "7.1.1" hashes = [ + "h1:Hu/Gy8dB7TXsUyswqm6XJhr7esYmXk9Ea/Jo9VgT4LE=", "h1:pQKxKh+bqz7MhpDDPVfEaNXMQtkp3xj3SAeMolfrgpo=", "zh:03ee9fdc0d157a606aba68658de6dc809fc3335cccb7c537373d8643412c1327", "zh:110e8ffe81deb8c203ecf310a15c2dedca1dfc936473a247b8a4f98adebd86f5", diff --git a/inputs/gcp/GKEHub/google_gke_hub_feature_membership/git_secure_auth/c.tf b/inputs/gcp/GKEHub/google_gke_hub_feature_membership/git_secure_auth/c.tf index e0bbebc5d..5288e8b2b 100644 --- a/inputs/gcp/GKEHub/google_gke_hub_feature_membership/git_secure_auth/c.tf +++ b/inputs/gcp/GKEHub/google_gke_hub_feature_membership/git_secure_auth/c.tf @@ -7,7 +7,7 @@ resource "google_gke_hub_feature_membership" "c" { config_sync { enabled = true git { - secret_type = "gcp_service_account_email" + secret_type = "gcpserviceaccount" gcp_service_account_email = "example@orgdomain.com" } } diff --git a/inputs/gcp/GKEHub/google_gke_hub_feature_membership/pc_enabled_required/.terraform.lock.hcl b/inputs/gcp/GKEHub/google_gke_hub_feature_membership/pc_enabled_required/.terraform.lock.hcl index 231d34a4b..78ddb99f9 100644 --- a/inputs/gcp/GKEHub/google_gke_hub_feature_membership/pc_enabled_required/.terraform.lock.hcl +++ b/inputs/gcp/GKEHub/google_gke_hub_feature_membership/pc_enabled_required/.terraform.lock.hcl @@ -4,6 +4,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "7.1.1" hashes = [ + "h1:Hu/Gy8dB7TXsUyswqm6XJhr7esYmXk9Ea/Jo9VgT4LE=", "h1:pQKxKh+bqz7MhpDDPVfEaNXMQtkp3xj3SAeMolfrgpo=", "zh:03ee9fdc0d157a606aba68658de6dc809fc3335cccb7c537373d8643412c1327", "zh:110e8ffe81deb8c203ecf310a15c2dedca1dfc936473a247b8a4f98adebd86f5", diff --git a/inputs/gcp/GKEHub/google_gke_hub_fleet/binauthz_policy_binding_approved/.terraform.lock.hcl b/inputs/gcp/GKEHub/google_gke_hub_fleet/binauthz_policy_binding_approved/.terraform.lock.hcl index f99045edd..fb44ac548 100644 --- a/inputs/gcp/GKEHub/google_gke_hub_fleet/binauthz_policy_binding_approved/.terraform.lock.hcl +++ b/inputs/gcp/GKEHub/google_gke_hub_fleet/binauthz_policy_binding_approved/.terraform.lock.hcl @@ -5,6 +5,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "7.2.0" hashes = [ "h1:eyse/cqci+EUDBQTejbfewzZ+rneeNEfiNDAjHDM0Bs=", + "h1:n9j0rZHrmXEay4dYo0D+RGS7X8eQr+YZ0MupX8GaMfI=", "zh:0f036e400c90ae45289b948afb49ca938d169fb4a31d7560b345fd0ae5121407", "zh:28a7c683656178456dc7942f051df46052150cee74da7535e7ca8748a83baf30", "zh:2994083c634cff44de626b4bfca3e5e8ed5b2a08baa6f4c4fa4b217d5f49559a", diff --git a/inputs/gcp/GKEHub/google_gke_hub_membership/authority_issuer/.terraform.lock.hcl b/inputs/gcp/GKEHub/google_gke_hub_membership/authority_issuer/.terraform.lock.hcl index f99045edd..fb44ac548 100644 --- a/inputs/gcp/GKEHub/google_gke_hub_membership/authority_issuer/.terraform.lock.hcl +++ b/inputs/gcp/GKEHub/google_gke_hub_membership/authority_issuer/.terraform.lock.hcl @@ -5,6 +5,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "7.2.0" hashes = [ "h1:eyse/cqci+EUDBQTejbfewzZ+rneeNEfiNDAjHDM0Bs=", + "h1:n9j0rZHrmXEay4dYo0D+RGS7X8eQr+YZ0MupX8GaMfI=", "zh:0f036e400c90ae45289b948afb49ca938d169fb4a31d7560b345fd0ae5121407", "zh:28a7c683656178456dc7942f051df46052150cee74da7535e7ca8748a83baf30", "zh:2994083c634cff44de626b4bfca3e5e8ed5b2a08baa6f4c4fa4b217d5f49559a", diff --git a/inputs/gcp/GKEHub/google_gke_hub_membership_rbac_role_binding/approved_roles/.terraform.lock.hcl b/inputs/gcp/GKEHub/google_gke_hub_membership_rbac_role_binding/approved_roles/.terraform.lock.hcl index e30f0e0aa..cb4481dc0 100644 --- a/inputs/gcp/GKEHub/google_gke_hub_membership_rbac_role_binding/approved_roles/.terraform.lock.hcl +++ b/inputs/gcp/GKEHub/google_gke_hub_membership_rbac_role_binding/approved_roles/.terraform.lock.hcl @@ -5,6 +5,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "7.2.0" hashes = [ "h1:eyse/cqci+EUDBQTejbfewzZ+rneeNEfiNDAjHDM0Bs=", + "h1:n9j0rZHrmXEay4dYo0D+RGS7X8eQr+YZ0MupX8GaMfI=", "zh:0f036e400c90ae45289b948afb49ca938d169fb4a31d7560b345fd0ae5121407", "zh:28a7c683656178456dc7942f051df46052150cee74da7535e7ca8748a83baf30", "zh:2994083c634cff44de626b4bfca3e5e8ed5b2a08baa6f4c4fa4b217d5f49559a", @@ -24,6 +25,7 @@ provider "registry.terraform.io/hashicorp/google-beta" { version = "7.2.0" hashes = [ "h1:L95Fok/xPMQPMOkpNQLSl/EbXT9C/FID24Fx/jM2l2U=", + "h1:rKj2i6jNLm1FEfEiX9VeUpHpZPsDinlPPROZvDWCJ8U=", "zh:015d927e5f5a75ec7f15090c80e27bc5d03115508286de791bcc7fffc53e990a", "zh:425837eba331c26d967dc7831094a482da12cfaa5807ace5c5540c716ebf19ff", "zh:435cfc975297a64681f3371b4ffe19f90e2914e4b64f9f8f592edc8bdf161d5d", diff --git a/inputs/gcp/GKEHub/google_gke_hub_scope_iam_binding/no_public_principals_binding/.terraform.lock.hcl b/inputs/gcp/GKEHub/google_gke_hub_scope_iam_binding/no_public_principals_binding/.terraform.lock.hcl index ca255f613..5698484ba 100644 --- a/inputs/gcp/GKEHub/google_gke_hub_scope_iam_binding/no_public_principals_binding/.terraform.lock.hcl +++ b/inputs/gcp/GKEHub/google_gke_hub_scope_iam_binding/no_public_principals_binding/.terraform.lock.hcl @@ -2,20 +2,20 @@ # Manual edits may be lost in future updates. provider "registry.terraform.io/hashicorp/google" { - version = "7.3.0" + version = "7.16.0" hashes = [ - "h1:/kL9bwTtcIfIlvQUkYdOV2c2XH8wiZL5eUb5XEXJmB0=", - "zh:135c90b063f15c090ce82d99887032e495bbe6388764b666148ae78a776c4621", - "zh:47bb8721c29556b3b42f7c2ed73f8fdfb214609599ba819eebbe9ae33aab0e07", - "zh:532d385f6381eaee111d96296fcd9da7cdefb31b2afc81e36f390bd6ea1c5e99", - "zh:5c96018f5b722d2871ae2cf21dab9b05ec722270facd2e62393bcf89dc34852d", - "zh:703caf0829c30e3d166f61a7af208388840b384be1ec440b0955584856d22e30", - "zh:80b965cbe057eea5205c8bfd81fce642de7425dab86482f91bef136b3c1faaff", - "zh:a18b8178124d5dcd8a69bb6fc37206838f03699f2443e803142b1e2fde6f55d1", - "zh:bdddc969d92f5ecafbf762179e2291169a7e24214a52ff263aaf872b5cceb582", - "zh:e30f79beaf07618131a717734a58f7b5626c1c53d6cc14887c7098add73e0ccb", - "zh:e95fe5ec32e9eeff1d56379c84bee3fac0a7f12ea1b90f34ff7d88d469f56c23", + "h1:o+dOw75zzgpJAUdjEa2a2T62OEThcEr52/4CymRAewA=", + "zh:1cd6f0926e5884998965675d3fbdc5e5abd7335d3f5f83571226be7f50f44443", + "zh:2bc3e3db662df08755af37d23c856f0ec3b8474f629f042ad3af228ff1c3cb5a", + "zh:41869013f786bff8c2ba35e203e84b6c3ec9ff623d6cea6796f5f0204719e907", + "zh:493213e16cb8de6a39b0d6b327faab7909f32ad973fb937d2b3bc4faa07c911a", + "zh:5e9df66ddeef9fcf77acd6185fe880e6b3725b98850ea3b47ef726c44dc04a71", + "zh:6b9e8f83316cf660549a4032342107bb41a7e549eba923f69aefa1ae5ab80a3f", + "zh:6da9316ca7c70d4997c4a62cd534f674e02888e351cb189f7b77b5a03e803773", + "zh:7d1b1dc7c04924dd203e9c5d2041fb732b1e2556b4041c9272a786d37924be7c", + "zh:86dcafef126ad72b592582d8fdb2591d8a2cb45ff85e5f5ff0ac76fbbd7be1bb", + "zh:8a8994c67297336ede3ded9d2558104d49de6fdfa85b88dc99b50030d68158cf", + "zh:a67d8b4774cdb45fb13e73e15885e229561a8b8f46d9f0069b81bf4d3ca03c4a", "zh:f569b65999264a9416862bca5cd2a6177d94ccb0424f3a4ef424428912b9cb3c", - "zh:fec21ae17d9d4e814d65ff377fbe1e2543636aaa3439a8a7a3447e7623044a4e", ] } diff --git a/inputs/gcp/GKEHub/google_gke_hub_scope_iam_member/no_public_principals_member/.terraform.lock.hcl b/inputs/gcp/GKEHub/google_gke_hub_scope_iam_member/no_public_principals_member/.terraform.lock.hcl index ca255f613..5698484ba 100644 --- a/inputs/gcp/GKEHub/google_gke_hub_scope_iam_member/no_public_principals_member/.terraform.lock.hcl +++ b/inputs/gcp/GKEHub/google_gke_hub_scope_iam_member/no_public_principals_member/.terraform.lock.hcl @@ -2,20 +2,20 @@ # Manual edits may be lost in future updates. provider "registry.terraform.io/hashicorp/google" { - version = "7.3.0" + version = "7.16.0" hashes = [ - "h1:/kL9bwTtcIfIlvQUkYdOV2c2XH8wiZL5eUb5XEXJmB0=", - "zh:135c90b063f15c090ce82d99887032e495bbe6388764b666148ae78a776c4621", - "zh:47bb8721c29556b3b42f7c2ed73f8fdfb214609599ba819eebbe9ae33aab0e07", - "zh:532d385f6381eaee111d96296fcd9da7cdefb31b2afc81e36f390bd6ea1c5e99", - "zh:5c96018f5b722d2871ae2cf21dab9b05ec722270facd2e62393bcf89dc34852d", - "zh:703caf0829c30e3d166f61a7af208388840b384be1ec440b0955584856d22e30", - "zh:80b965cbe057eea5205c8bfd81fce642de7425dab86482f91bef136b3c1faaff", - "zh:a18b8178124d5dcd8a69bb6fc37206838f03699f2443e803142b1e2fde6f55d1", - "zh:bdddc969d92f5ecafbf762179e2291169a7e24214a52ff263aaf872b5cceb582", - "zh:e30f79beaf07618131a717734a58f7b5626c1c53d6cc14887c7098add73e0ccb", - "zh:e95fe5ec32e9eeff1d56379c84bee3fac0a7f12ea1b90f34ff7d88d469f56c23", + "h1:o+dOw75zzgpJAUdjEa2a2T62OEThcEr52/4CymRAewA=", + "zh:1cd6f0926e5884998965675d3fbdc5e5abd7335d3f5f83571226be7f50f44443", + "zh:2bc3e3db662df08755af37d23c856f0ec3b8474f629f042ad3af228ff1c3cb5a", + "zh:41869013f786bff8c2ba35e203e84b6c3ec9ff623d6cea6796f5f0204719e907", + "zh:493213e16cb8de6a39b0d6b327faab7909f32ad973fb937d2b3bc4faa07c911a", + "zh:5e9df66ddeef9fcf77acd6185fe880e6b3725b98850ea3b47ef726c44dc04a71", + "zh:6b9e8f83316cf660549a4032342107bb41a7e549eba923f69aefa1ae5ab80a3f", + "zh:6da9316ca7c70d4997c4a62cd534f674e02888e351cb189f7b77b5a03e803773", + "zh:7d1b1dc7c04924dd203e9c5d2041fb732b1e2556b4041c9272a786d37924be7c", + "zh:86dcafef126ad72b592582d8fdb2591d8a2cb45ff85e5f5ff0ac76fbbd7be1bb", + "zh:8a8994c67297336ede3ded9d2558104d49de6fdfa85b88dc99b50030d68158cf", + "zh:a67d8b4774cdb45fb13e73e15885e229561a8b8f46d9f0069b81bf4d3ca03c4a", "zh:f569b65999264a9416862bca5cd2a6177d94ccb0424f3a4ef424428912b9cb3c", - "zh:fec21ae17d9d4e814d65ff377fbe1e2543636aaa3439a8a7a3447e7623044a4e", ] } diff --git a/inputs/gcp/GKEHub/google_gke_hub_scope_iam_policy/no_public_principals_policy/.terraform.lock.hcl b/inputs/gcp/GKEHub/google_gke_hub_scope_iam_policy/no_public_principals_policy/.terraform.lock.hcl index ca255f613..5698484ba 100644 --- a/inputs/gcp/GKEHub/google_gke_hub_scope_iam_policy/no_public_principals_policy/.terraform.lock.hcl +++ b/inputs/gcp/GKEHub/google_gke_hub_scope_iam_policy/no_public_principals_policy/.terraform.lock.hcl @@ -2,20 +2,20 @@ # Manual edits may be lost in future updates. provider "registry.terraform.io/hashicorp/google" { - version = "7.3.0" + version = "7.16.0" hashes = [ - "h1:/kL9bwTtcIfIlvQUkYdOV2c2XH8wiZL5eUb5XEXJmB0=", - "zh:135c90b063f15c090ce82d99887032e495bbe6388764b666148ae78a776c4621", - "zh:47bb8721c29556b3b42f7c2ed73f8fdfb214609599ba819eebbe9ae33aab0e07", - "zh:532d385f6381eaee111d96296fcd9da7cdefb31b2afc81e36f390bd6ea1c5e99", - "zh:5c96018f5b722d2871ae2cf21dab9b05ec722270facd2e62393bcf89dc34852d", - "zh:703caf0829c30e3d166f61a7af208388840b384be1ec440b0955584856d22e30", - "zh:80b965cbe057eea5205c8bfd81fce642de7425dab86482f91bef136b3c1faaff", - "zh:a18b8178124d5dcd8a69bb6fc37206838f03699f2443e803142b1e2fde6f55d1", - "zh:bdddc969d92f5ecafbf762179e2291169a7e24214a52ff263aaf872b5cceb582", - "zh:e30f79beaf07618131a717734a58f7b5626c1c53d6cc14887c7098add73e0ccb", - "zh:e95fe5ec32e9eeff1d56379c84bee3fac0a7f12ea1b90f34ff7d88d469f56c23", + "h1:o+dOw75zzgpJAUdjEa2a2T62OEThcEr52/4CymRAewA=", + "zh:1cd6f0926e5884998965675d3fbdc5e5abd7335d3f5f83571226be7f50f44443", + "zh:2bc3e3db662df08755af37d23c856f0ec3b8474f629f042ad3af228ff1c3cb5a", + "zh:41869013f786bff8c2ba35e203e84b6c3ec9ff623d6cea6796f5f0204719e907", + "zh:493213e16cb8de6a39b0d6b327faab7909f32ad973fb937d2b3bc4faa07c911a", + "zh:5e9df66ddeef9fcf77acd6185fe880e6b3725b98850ea3b47ef726c44dc04a71", + "zh:6b9e8f83316cf660549a4032342107bb41a7e549eba923f69aefa1ae5ab80a3f", + "zh:6da9316ca7c70d4997c4a62cd534f674e02888e351cb189f7b77b5a03e803773", + "zh:7d1b1dc7c04924dd203e9c5d2041fb732b1e2556b4041c9272a786d37924be7c", + "zh:86dcafef126ad72b592582d8fdb2591d8a2cb45ff85e5f5ff0ac76fbbd7be1bb", + "zh:8a8994c67297336ede3ded9d2558104d49de6fdfa85b88dc99b50030d68158cf", + "zh:a67d8b4774cdb45fb13e73e15885e229561a8b8f46d9f0069b81bf4d3ca03c4a", "zh:f569b65999264a9416862bca5cd2a6177d94ccb0424f3a4ef424428912b9cb3c", - "zh:fec21ae17d9d4e814d65ff377fbe1e2543636aaa3439a8a7a3447e7623044a4e", ] } diff --git a/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_level/allowed_device_management_levels/.terraform.lock.hcl b/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_level/allowed_device_management_levels/.terraform.lock.hcl index 653c7021d..9d894e742 100644 --- a/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_level/allowed_device_management_levels/.terraform.lock.hcl +++ b/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_level/allowed_device_management_levels/.terraform.lock.hcl @@ -5,6 +5,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "7.12.0" hashes = [ "h1:axUhrDS/FeAEKHRKS57WfT0AkrNDC3d5DkWMMnk+fT4=", + "h1:vd1110nYSvbUdAM3MDtQD97ikZvuyDgKExlzTwutYqw=", "zh:38722ec7777543c23e22e02695e53dd5c94644022647c3c79e11e587063d4d2b", "zh:417b12b69c91c12e3fcefee38744b7a37bae73b706e3071c714151a623a6b0e9", "zh:4902cea92c78b462beaf053de03d0d55fb2241d41ca3379b4568ba247f667fa9", diff --git a/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_level/allowed_encryption_statuses/.terraform.lock.hcl b/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_level/allowed_encryption_statuses/.terraform.lock.hcl index 653c7021d..9d894e742 100644 --- a/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_level/allowed_encryption_statuses/.terraform.lock.hcl +++ b/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_level/allowed_encryption_statuses/.terraform.lock.hcl @@ -5,6 +5,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "7.12.0" hashes = [ "h1:axUhrDS/FeAEKHRKS57WfT0AkrNDC3d5DkWMMnk+fT4=", + "h1:vd1110nYSvbUdAM3MDtQD97ikZvuyDgKExlzTwutYqw=", "zh:38722ec7777543c23e22e02695e53dd5c94644022647c3c79e11e587063d4d2b", "zh:417b12b69c91c12e3fcefee38744b7a37bae73b706e3071c714151a623a6b0e9", "zh:4902cea92c78b462beaf053de03d0d55fb2241d41ca3379b4568ba247f667fa9", diff --git a/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_level/os_type/.terraform.lock.hcl b/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_level/os_type/.terraform.lock.hcl index 653c7021d..9d894e742 100644 --- a/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_level/os_type/.terraform.lock.hcl +++ b/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_level/os_type/.terraform.lock.hcl @@ -5,6 +5,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "7.12.0" hashes = [ "h1:axUhrDS/FeAEKHRKS57WfT0AkrNDC3d5DkWMMnk+fT4=", + "h1:vd1110nYSvbUdAM3MDtQD97ikZvuyDgKExlzTwutYqw=", "zh:38722ec7777543c23e22e02695e53dd5c94644022647c3c79e11e587063d4d2b", "zh:417b12b69c91c12e3fcefee38744b7a37bae73b706e3071c714151a623a6b0e9", "zh:4902cea92c78b462beaf053de03d0d55fb2241d41ca3379b4568ba247f667fa9", diff --git a/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_level/os_type/plan.json b/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_level/os_type/plan.json index fb5950932..41494523a 100644 --- a/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_level/os_type/plan.json +++ b/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_level/os_type/plan.json @@ -1 +1 @@ -{"format_version":"1.2","terraform_version":"1.12.2","planned_values":{"root_module":{"resources":[{"address":"google_access_context_manager_access_level.c-os_type","mode":"managed","type":"google_access_context_manager_access_level","name":"c-os_type","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"basic":[{"combining_function":"AND","conditions":[{"device_policy":[{"allowed_device_management_levels":null,"allowed_encryption_statuses":null,"os_constraints":[{"minimum_version":null,"os_type":"DESKTOP_CHROME_OS","require_verified_chrome_os":null}],"require_admin_approval":null,"require_corp_owned":null,"require_screen_lock":null}],"ip_subnetworks":null,"members":null,"negate":null,"regions":null,"required_access_levels":null,"vpc_network_sources":[]}]}],"custom":[],"description":null,"timeouts":null,"title":"chromeos_no_lock"},"sensitive_values":{"basic":[{"conditions":[{"device_policy":[{"os_constraints":[{}]}],"vpc_network_sources":[]}]}],"custom":[]}},{"address":"google_access_context_manager_access_level.nc-os_type","mode":"managed","type":"google_access_context_manager_access_level","name":"nc-os_type","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"basic":[{"combining_function":"AND","conditions":[{"device_policy":[{"allowed_device_management_levels":null,"allowed_encryption_statuses":null,"os_constraints":[{"minimum_version":null,"os_type":"ANDROID","require_verified_chrome_os":null},{"minimum_version":null,"os_type":"IOS","require_verified_chrome_os":null},{"minimum_version":null,"os_type":"OS_UNSPECIFIED","require_verified_chrome_os":null}],"require_admin_approval":null,"require_corp_owned":null,"require_screen_lock":null}],"ip_subnetworks":null,"members":null,"negate":null,"regions":null,"required_access_levels":null,"vpc_network_sources":[]}]}],"custom":[],"description":null,"timeouts":null,"title":"chromeos_no_lock"},"sensitive_values":{"basic":[{"conditions":[{"device_policy":[{"os_constraints":[{},{},{}]}],"vpc_network_sources":[]}]}],"custom":[]}},{"address":"google_access_context_manager_access_policy.access-policy","mode":"managed","type":"google_access_context_manager_access_policy","name":"access-policy","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"parent":"organizations/123456789","scopes":null,"timeouts":null,"title":"my policy"},"sensitive_values":{}}]}},"resource_changes":[{"address":"google_access_context_manager_access_level.c-os_type","mode":"managed","type":"google_access_context_manager_access_level","name":"c-os_type","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"basic":[{"combining_function":"AND","conditions":[{"device_policy":[{"allowed_device_management_levels":null,"allowed_encryption_statuses":null,"os_constraints":[{"minimum_version":null,"os_type":"DESKTOP_CHROME_OS","require_verified_chrome_os":null}],"require_admin_approval":null,"require_corp_owned":null,"require_screen_lock":null}],"ip_subnetworks":null,"members":null,"negate":null,"regions":null,"required_access_levels":null,"vpc_network_sources":[]}]}],"custom":[],"description":null,"timeouts":null,"title":"chromeos_no_lock"},"after_unknown":{"basic":[{"conditions":[{"device_policy":[{"os_constraints":[{}]}],"vpc_network_sources":[]}]}],"custom":[],"id":true,"name":true,"parent":true},"before_sensitive":false,"after_sensitive":{"basic":[{"conditions":[{"device_policy":[{"os_constraints":[{}]}],"vpc_network_sources":[]}]}],"custom":[]}}},{"address":"google_access_context_manager_access_level.nc-os_type","mode":"managed","type":"google_access_context_manager_access_level","name":"nc-os_type","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"basic":[{"combining_function":"AND","conditions":[{"device_policy":[{"allowed_device_management_levels":null,"allowed_encryption_statuses":null,"os_constraints":[{"minimum_version":null,"os_type":"ANDROID","require_verified_chrome_os":null},{"minimum_version":null,"os_type":"IOS","require_verified_chrome_os":null},{"minimum_version":null,"os_type":"OS_UNSPECIFIED","require_verified_chrome_os":null}],"require_admin_approval":null,"require_corp_owned":null,"require_screen_lock":null}],"ip_subnetworks":null,"members":null,"negate":null,"regions":null,"required_access_levels":null,"vpc_network_sources":[]}]}],"custom":[],"description":null,"timeouts":null,"title":"chromeos_no_lock"},"after_unknown":{"basic":[{"conditions":[{"device_policy":[{"os_constraints":[{},{},{}]}],"vpc_network_sources":[]}]}],"custom":[],"id":true,"name":true,"parent":true},"before_sensitive":false,"after_sensitive":{"basic":[{"conditions":[{"device_policy":[{"os_constraints":[{},{},{}]}],"vpc_network_sources":[]}]}],"custom":[]}}},{"address":"google_access_context_manager_access_policy.access-policy","mode":"managed","type":"google_access_context_manager_access_policy","name":"access-policy","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"parent":"organizations/123456789","scopes":null,"timeouts":null,"title":"my policy"},"after_unknown":{"create_time":true,"id":true,"name":true,"update_time":true},"before_sensitive":false,"after_sensitive":{}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_access_context_manager_access_level.c-os_type","mode":"managed","type":"google_access_context_manager_access_level","name":"c-os_type","provider_config_key":"google","expressions":{"basic":[{"conditions":[{"device_policy":[{"os_constraints":[{"os_type":{"constant_value":"DESKTOP_CHROME_OS"}}]}]}]}],"name":{"references":["google_access_context_manager_access_policy.access-policy.name","google_access_context_manager_access_policy.access-policy"]},"parent":{"references":["google_access_context_manager_access_policy.access-policy.name","google_access_context_manager_access_policy.access-policy"]},"title":{"constant_value":"chromeos_no_lock"}},"schema_version":0},{"address":"google_access_context_manager_access_level.nc-os_type","mode":"managed","type":"google_access_context_manager_access_level","name":"nc-os_type","provider_config_key":"google","expressions":{"basic":[{"conditions":[{"device_policy":[{"os_constraints":[{"os_type":{"constant_value":"ANDROID"}},{"os_type":{"constant_value":"IOS"}},{"os_type":{"constant_value":"OS_UNSPECIFIED"}}]}]}]}],"name":{"references":["google_access_context_manager_access_policy.access-policy.name","google_access_context_manager_access_policy.access-policy"]},"parent":{"references":["google_access_context_manager_access_policy.access-policy.name","google_access_context_manager_access_policy.access-policy"]},"title":{"constant_value":"chromeos_no_lock"}},"schema_version":0},{"address":"google_access_context_manager_access_policy.access-policy","mode":"managed","type":"google_access_context_manager_access_policy","name":"access-policy","provider_config_key":"google","expressions":{"parent":{"constant_value":"organizations/123456789"},"title":{"constant_value":"my policy"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"google_access_context_manager_access_policy.access-policy","attribute":["name"]}],"timestamp":"2025-12-03T05:19:51Z","applyable":true,"complete":true,"errored":false} +{"format_version":"1.2","terraform_version":"1.13.3","planned_values":{"root_module":{"resources":[{"address":"google_access_context_manager_access_level.c","mode":"managed","type":"google_access_context_manager_access_level","name":"c","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"basic":[{"combining_function":"AND","conditions":[{"device_policy":[{"allowed_device_management_levels":["COMPLETE"],"allowed_encryption_statuses":null,"os_constraints":[],"require_admin_approval":null,"require_corp_owned":null,"require_screen_lock":null}],"ip_subnetworks":null,"members":null,"negate":null,"regions":null,"required_access_levels":null,"vpc_network_sources":[]}]}],"custom":[],"description":null,"timeouts":null,"title":"chromeos_no_lock"},"sensitive_values":{"basic":[{"conditions":[{"device_policy":[{"allowed_device_management_levels":[false],"os_constraints":[]}],"vpc_network_sources":[]}]}],"custom":[]}},{"address":"google_access_context_manager_access_level.nc","mode":"managed","type":"google_access_context_manager_access_level","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"basic":[{"combining_function":"AND","conditions":[{"device_policy":[{"allowed_device_management_levels":null,"allowed_encryption_statuses":null,"os_constraints":[{"minimum_version":null,"os_type":"OS_UNSPECIFIED","require_verified_chrome_os":null}],"require_admin_approval":null,"require_corp_owned":null,"require_screen_lock":null}],"ip_subnetworks":null,"members":null,"negate":null,"regions":null,"required_access_levels":null,"vpc_network_sources":[]}]}],"custom":[],"description":null,"name":"nc","timeouts":null,"title":"nc-os_type"},"sensitive_values":{"basic":[{"conditions":[{"device_policy":[{"os_constraints":[{}]}],"vpc_network_sources":[]}]}],"custom":[]}},{"address":"google_access_context_manager_access_policy.access-policy","mode":"managed","type":"google_access_context_manager_access_policy","name":"access-policy","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"parent":"organizations/123456789","scopes":null,"timeouts":null,"title":"my policy"},"sensitive_values":{}}]}},"resource_changes":[{"address":"google_access_context_manager_access_level.c","mode":"managed","type":"google_access_context_manager_access_level","name":"c","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"basic":[{"combining_function":"AND","conditions":[{"device_policy":[{"allowed_device_management_levels":["COMPLETE"],"allowed_encryption_statuses":null,"os_constraints":[],"require_admin_approval":null,"require_corp_owned":null,"require_screen_lock":null}],"ip_subnetworks":null,"members":null,"negate":null,"regions":null,"required_access_levels":null,"vpc_network_sources":[]}]}],"custom":[],"description":null,"timeouts":null,"title":"chromeos_no_lock"},"after_unknown":{"basic":[{"conditions":[{"device_policy":[{"allowed_device_management_levels":[false],"os_constraints":[]}],"vpc_network_sources":[]}]}],"custom":[],"id":true,"name":true,"parent":true},"before_sensitive":false,"after_sensitive":{"basic":[{"conditions":[{"device_policy":[{"allowed_device_management_levels":[false],"os_constraints":[]}],"vpc_network_sources":[]}]}],"custom":[]}}},{"address":"google_access_context_manager_access_level.nc","mode":"managed","type":"google_access_context_manager_access_level","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"basic":[{"combining_function":"AND","conditions":[{"device_policy":[{"allowed_device_management_levels":null,"allowed_encryption_statuses":null,"os_constraints":[{"minimum_version":null,"os_type":"OS_UNSPECIFIED","require_verified_chrome_os":null}],"require_admin_approval":null,"require_corp_owned":null,"require_screen_lock":null}],"ip_subnetworks":null,"members":null,"negate":null,"regions":null,"required_access_levels":null,"vpc_network_sources":[]}]}],"custom":[],"description":null,"name":"nc","timeouts":null,"title":"nc-os_type"},"after_unknown":{"basic":[{"conditions":[{"device_policy":[{"os_constraints":[{}]}],"vpc_network_sources":[]}]}],"custom":[],"id":true,"parent":true},"before_sensitive":false,"after_sensitive":{"basic":[{"conditions":[{"device_policy":[{"os_constraints":[{}]}],"vpc_network_sources":[]}]}],"custom":[]}}},{"address":"google_access_context_manager_access_policy.access-policy","mode":"managed","type":"google_access_context_manager_access_policy","name":"access-policy","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"parent":"organizations/123456789","scopes":null,"timeouts":null,"title":"my policy"},"after_unknown":{"create_time":true,"id":true,"name":true,"update_time":true},"before_sensitive":false,"after_sensitive":{}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_access_context_manager_access_level.c","mode":"managed","type":"google_access_context_manager_access_level","name":"c","provider_config_key":"google","expressions":{"basic":[{"conditions":[{"device_policy":[{"allowed_device_management_levels":{"constant_value":["COMPLETE"]}}]}]}],"name":{"references":["google_access_context_manager_access_policy.access-policy.name","google_access_context_manager_access_policy.access-policy"]},"parent":{"references":["google_access_context_manager_access_policy.access-policy.name","google_access_context_manager_access_policy.access-policy"]},"title":{"constant_value":"chromeos_no_lock"}},"schema_version":0},{"address":"google_access_context_manager_access_level.nc","mode":"managed","type":"google_access_context_manager_access_level","name":"nc","provider_config_key":"google","expressions":{"basic":[{"conditions":[{"device_policy":[{"os_constraints":[{"os_type":{"constant_value":"OS_UNSPECIFIED"}}]}]}]}],"name":{"constant_value":"nc"},"parent":{"references":["google_access_context_manager_access_policy.access-policy.name","google_access_context_manager_access_policy.access-policy"]},"title":{"constant_value":"nc-os_type"}},"schema_version":0},{"address":"google_access_context_manager_access_policy.access-policy","mode":"managed","type":"google_access_context_manager_access_policy","name":"access-policy","provider_config_key":"google","expressions":{"parent":{"constant_value":"organizations/123456789"},"title":{"constant_value":"my policy"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"google_access_context_manager_access_policy.access-policy","attribute":["name"]}],"timestamp":"2026-01-24T01:17:14Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_level/region/.terraform.lock.hcl b/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_level/region/.terraform.lock.hcl index 653c7021d..9d894e742 100644 --- a/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_level/region/.terraform.lock.hcl +++ b/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_level/region/.terraform.lock.hcl @@ -5,6 +5,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "7.12.0" hashes = [ "h1:axUhrDS/FeAEKHRKS57WfT0AkrNDC3d5DkWMMnk+fT4=", + "h1:vd1110nYSvbUdAM3MDtQD97ikZvuyDgKExlzTwutYqw=", "zh:38722ec7777543c23e22e02695e53dd5c94644022647c3c79e11e587063d4d2b", "zh:417b12b69c91c12e3fcefee38744b7a37bae73b706e3071c714151a623a6b0e9", "zh:4902cea92c78b462beaf053de03d0d55fb2241d41ca3379b4568ba247f667fa9", diff --git a/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_level/region/plan.json b/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_level/region/plan.json index 87ca2ec35..7d90e0e07 100644 --- a/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_level/region/plan.json +++ b/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_level/region/plan.json @@ -1 +1 @@ -{"format_version":"1.2","terraform_version":"1.12.2","planned_values":{"root_module":{"resources":[{"address":"google_access_context_manager_access_level.c","mode":"managed","type":"google_access_context_manager_access_level","name":"c","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"basic":[{"combining_function":"AND","conditions":[{"device_policy":[],"ip_subnetworks":null,"members":null,"negate":null,"regions":["australia-southeast1","australia-southeast2"],"required_access_levels":null,"vpc_network_sources":[]}]}],"custom":[],"description":null,"name":"c","timeouts":null,"title":"c-region"},"sensitive_values":{"basic":[{"conditions":[{"device_policy":[],"regions":[false,false],"vpc_network_sources":[]}]}],"custom":[]}},{"address":"google_access_context_manager_access_level.nc","mode":"managed","type":"google_access_context_manager_access_level","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"basic":[{"combining_function":"AND","conditions":[{"device_policy":[],"ip_subnetworks":null,"members":null,"negate":null,"regions":["CH","IT","US"],"required_access_levels":null,"vpc_network_sources":[]}]}],"custom":[],"description":null,"name":"nc","timeouts":null,"title":"nc-region"},"sensitive_values":{"basic":[{"conditions":[{"device_policy":[],"regions":[false,false,false],"vpc_network_sources":[]}]}],"custom":[]}},{"address":"google_access_context_manager_access_policy.access-policy","mode":"managed","type":"google_access_context_manager_access_policy","name":"access-policy","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"parent":"organizations/123456789","scopes":null,"timeouts":null,"title":"my policy"},"sensitive_values":{}}]}},"resource_changes":[{"address":"google_access_context_manager_access_level.c","mode":"managed","type":"google_access_context_manager_access_level","name":"c","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"basic":[{"combining_function":"AND","conditions":[{"device_policy":[],"ip_subnetworks":null,"members":null,"negate":null,"regions":["australia-southeast1","australia-southeast2"],"required_access_levels":null,"vpc_network_sources":[]}]}],"custom":[],"description":null,"name":"c","timeouts":null,"title":"c-region"},"after_unknown":{"basic":[{"conditions":[{"device_policy":[],"regions":[false,false],"vpc_network_sources":[]}]}],"custom":[],"id":true,"parent":true},"before_sensitive":false,"after_sensitive":{"basic":[{"conditions":[{"device_policy":[],"regions":[false,false],"vpc_network_sources":[]}]}],"custom":[]}}},{"address":"google_access_context_manager_access_level.nc","mode":"managed","type":"google_access_context_manager_access_level","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"basic":[{"combining_function":"AND","conditions":[{"device_policy":[],"ip_subnetworks":null,"members":null,"negate":null,"regions":["CH","IT","US"],"required_access_levels":null,"vpc_network_sources":[]}]}],"custom":[],"description":null,"name":"nc","timeouts":null,"title":"nc-region"},"after_unknown":{"basic":[{"conditions":[{"device_policy":[],"regions":[false,false,false],"vpc_network_sources":[]}]}],"custom":[],"id":true,"parent":true},"before_sensitive":false,"after_sensitive":{"basic":[{"conditions":[{"device_policy":[],"regions":[false,false,false],"vpc_network_sources":[]}]}],"custom":[]}}},{"address":"google_access_context_manager_access_policy.access-policy","mode":"managed","type":"google_access_context_manager_access_policy","name":"access-policy","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"parent":"organizations/123456789","scopes":null,"timeouts":null,"title":"my policy"},"after_unknown":{"create_time":true,"id":true,"name":true,"update_time":true},"before_sensitive":false,"after_sensitive":{}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_access_context_manager_access_level.c","mode":"managed","type":"google_access_context_manager_access_level","name":"c","provider_config_key":"google","expressions":{"basic":[{"conditions":[{"regions":{"constant_value":["australia-southeast1","australia-southeast2"]}}]}],"name":{"constant_value":"c"},"parent":{"references":["google_access_context_manager_access_policy.access-policy.name","google_access_context_manager_access_policy.access-policy"]},"title":{"constant_value":"c-region"}},"schema_version":0},{"address":"google_access_context_manager_access_level.nc","mode":"managed","type":"google_access_context_manager_access_level","name":"nc","provider_config_key":"google","expressions":{"basic":[{"conditions":[{"regions":{"constant_value":["CH","IT","US"]}}]}],"name":{"constant_value":"nc"},"parent":{"references":["google_access_context_manager_access_policy.access-policy.name","google_access_context_manager_access_policy.access-policy"]},"title":{"constant_value":"nc-region"}},"schema_version":0},{"address":"google_access_context_manager_access_policy.access-policy","mode":"managed","type":"google_access_context_manager_access_policy","name":"access-policy","provider_config_key":"google","expressions":{"parent":{"constant_value":"organizations/123456789"},"title":{"constant_value":"my policy"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"google_access_context_manager_access_policy.access-policy","attribute":["name"]}],"timestamp":"2025-12-04T04:36:33Z","applyable":true,"complete":true,"errored":false} +{"format_version":"1.2","terraform_version":"1.13.3","planned_values":{"root_module":{"resources":[{"address":"google_access_context_manager_access_level.c","mode":"managed","type":"google_access_context_manager_access_level","name":"c","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"basic":[{"combining_function":"AND","conditions":[{"device_policy":[],"ip_subnetworks":null,"members":null,"negate":null,"regions":["australia-southeast1","australia-southeast2"],"required_access_levels":null,"vpc_network_sources":[]}]}],"custom":[],"description":null,"name":"c","timeouts":null,"title":"c-region"},"sensitive_values":{"basic":[{"conditions":[{"device_policy":[],"regions":[false,false],"vpc_network_sources":[]}]}],"custom":[]}},{"address":"google_access_context_manager_access_level.nc","mode":"managed","type":"google_access_context_manager_access_level","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"basic":[{"combining_function":"AND","conditions":[{"device_policy":[],"ip_subnetworks":null,"members":null,"negate":null,"regions":["CH","IT","US"],"required_access_levels":null,"vpc_network_sources":[]}]}],"custom":[],"description":null,"name":"nc","timeouts":null,"title":"nc-region"},"sensitive_values":{"basic":[{"conditions":[{"device_policy":[],"regions":[false,false,false],"vpc_network_sources":[]}]}],"custom":[]}},{"address":"google_access_context_manager_access_policy.access-policy","mode":"managed","type":"google_access_context_manager_access_policy","name":"access-policy","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"parent":"organizations/123456789","scopes":null,"timeouts":null,"title":"my policy"},"sensitive_values":{}}]}},"resource_changes":[{"address":"google_access_context_manager_access_level.c","mode":"managed","type":"google_access_context_manager_access_level","name":"c","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"basic":[{"combining_function":"AND","conditions":[{"device_policy":[],"ip_subnetworks":null,"members":null,"negate":null,"regions":["australia-southeast1","australia-southeast2"],"required_access_levels":null,"vpc_network_sources":[]}]}],"custom":[],"description":null,"name":"c","timeouts":null,"title":"c-region"},"after_unknown":{"basic":[{"conditions":[{"device_policy":[],"regions":[false,false],"vpc_network_sources":[]}]}],"custom":[],"id":true,"parent":true},"before_sensitive":false,"after_sensitive":{"basic":[{"conditions":[{"device_policy":[],"regions":[false,false],"vpc_network_sources":[]}]}],"custom":[]}}},{"address":"google_access_context_manager_access_level.nc","mode":"managed","type":"google_access_context_manager_access_level","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"basic":[{"combining_function":"AND","conditions":[{"device_policy":[],"ip_subnetworks":null,"members":null,"negate":null,"regions":["CH","IT","US"],"required_access_levels":null,"vpc_network_sources":[]}]}],"custom":[],"description":null,"name":"nc","timeouts":null,"title":"nc-region"},"after_unknown":{"basic":[{"conditions":[{"device_policy":[],"regions":[false,false,false],"vpc_network_sources":[]}]}],"custom":[],"id":true,"parent":true},"before_sensitive":false,"after_sensitive":{"basic":[{"conditions":[{"device_policy":[],"regions":[false,false,false],"vpc_network_sources":[]}]}],"custom":[]}}},{"address":"google_access_context_manager_access_policy.access-policy","mode":"managed","type":"google_access_context_manager_access_policy","name":"access-policy","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"parent":"organizations/123456789","scopes":null,"timeouts":null,"title":"my policy"},"after_unknown":{"create_time":true,"id":true,"name":true,"update_time":true},"before_sensitive":false,"after_sensitive":{}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_access_context_manager_access_level.c","mode":"managed","type":"google_access_context_manager_access_level","name":"c","provider_config_key":"google","expressions":{"basic":[{"conditions":[{"regions":{"constant_value":["australia-southeast1","australia-southeast2"]}}]}],"name":{"constant_value":"c"},"parent":{"references":["google_access_context_manager_access_policy.access-policy.name","google_access_context_manager_access_policy.access-policy"]},"title":{"constant_value":"c-region"}},"schema_version":0},{"address":"google_access_context_manager_access_level.nc","mode":"managed","type":"google_access_context_manager_access_level","name":"nc","provider_config_key":"google","expressions":{"basic":[{"conditions":[{"regions":{"constant_value":["CH","IT","US"]}}]}],"name":{"constant_value":"nc"},"parent":{"references":["google_access_context_manager_access_policy.access-policy.name","google_access_context_manager_access_policy.access-policy"]},"title":{"constant_value":"nc-region"}},"schema_version":0},{"address":"google_access_context_manager_access_policy.access-policy","mode":"managed","type":"google_access_context_manager_access_policy","name":"access-policy","provider_config_key":"google","expressions":{"parent":{"constant_value":"organizations/123456789"},"title":{"constant_value":"my policy"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"google_access_context_manager_access_policy.access-policy","attribute":["name"]}],"timestamp":"2026-01-24T01:16:50Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_level/require_admin_approval/.terraform.lock.hcl b/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_level/require_admin_approval/.terraform.lock.hcl index 653c7021d..9d894e742 100644 --- a/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_level/require_admin_approval/.terraform.lock.hcl +++ b/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_level/require_admin_approval/.terraform.lock.hcl @@ -5,6 +5,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "7.12.0" hashes = [ "h1:axUhrDS/FeAEKHRKS57WfT0AkrNDC3d5DkWMMnk+fT4=", + "h1:vd1110nYSvbUdAM3MDtQD97ikZvuyDgKExlzTwutYqw=", "zh:38722ec7777543c23e22e02695e53dd5c94644022647c3c79e11e587063d4d2b", "zh:417b12b69c91c12e3fcefee38744b7a37bae73b706e3071c714151a623a6b0e9", "zh:4902cea92c78b462beaf053de03d0d55fb2241d41ca3379b4568ba247f667fa9", diff --git a/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_level/require_corp_owned/.terraform.lock.hcl b/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_level/require_corp_owned/.terraform.lock.hcl index 653c7021d..9d894e742 100644 --- a/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_level/require_corp_owned/.terraform.lock.hcl +++ b/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_level/require_corp_owned/.terraform.lock.hcl @@ -5,6 +5,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "7.12.0" hashes = [ "h1:axUhrDS/FeAEKHRKS57WfT0AkrNDC3d5DkWMMnk+fT4=", + "h1:vd1110nYSvbUdAM3MDtQD97ikZvuyDgKExlzTwutYqw=", "zh:38722ec7777543c23e22e02695e53dd5c94644022647c3c79e11e587063d4d2b", "zh:417b12b69c91c12e3fcefee38744b7a37bae73b706e3071c714151a623a6b0e9", "zh:4902cea92c78b462beaf053de03d0d55fb2241d41ca3379b4568ba247f667fa9", diff --git a/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_level/require_screen_lock/.terraform.lock.hcl b/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_level/require_screen_lock/.terraform.lock.hcl index 653c7021d..9d894e742 100644 --- a/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_level/require_screen_lock/.terraform.lock.hcl +++ b/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_level/require_screen_lock/.terraform.lock.hcl @@ -5,6 +5,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "7.12.0" hashes = [ "h1:axUhrDS/FeAEKHRKS57WfT0AkrNDC3d5DkWMMnk+fT4=", + "h1:vd1110nYSvbUdAM3MDtQD97ikZvuyDgKExlzTwutYqw=", "zh:38722ec7777543c23e22e02695e53dd5c94644022647c3c79e11e587063d4d2b", "zh:417b12b69c91c12e3fcefee38744b7a37bae73b706e3071c714151a623a6b0e9", "zh:4902cea92c78b462beaf053de03d0d55fb2241d41ca3379b4568ba247f667fa9", diff --git a/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_level/require_screen_lock/plan.json b/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_level/require_screen_lock/plan.json index 42e26af4b..ed7de942b 100644 --- a/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_level/require_screen_lock/plan.json +++ b/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_level/require_screen_lock/plan.json @@ -1 +1 @@ -{"format_version":"1.2","terraform_version":"1.12.2","planned_values":{"root_module":{"resources":[{"address":"google_access_context_manager_access_level.c","mode":"managed","type":"google_access_context_manager_access_level","name":"c","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"basic":[{"combining_function":"AND","conditions":[{"device_policy":[{"allowed_device_management_levels":null,"allowed_encryption_statuses":null,"os_constraints":[],"require_admin_approval":null,"require_corp_owned":null,"require_screen_lock":true}],"ip_subnetworks":null,"members":null,"negate":null,"regions":null,"required_access_levels":null,"vpc_network_sources":[]}]}],"custom":[],"description":null,"timeouts":null,"title":"chromeos_no_lock"},"sensitive_values":{"basic":[{"conditions":[{"device_policy":[{"os_constraints":[]}],"vpc_network_sources":[]}]}],"custom":[]}},{"address":"google_access_context_manager_access_level.nc","mode":"managed","type":"google_access_context_manager_access_level","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"basic":[{"combining_function":"AND","conditions":[{"device_policy":[{"allowed_device_management_levels":null,"allowed_encryption_statuses":null,"os_constraints":[{"minimum_version":null,"os_type":"DESKTOP_CHROME_OS","require_verified_chrome_os":null}],"require_admin_approval":null,"require_corp_owned":null,"require_screen_lock":true}],"ip_subnetworks":null,"members":null,"negate":null,"regions":["CH","IT","US"],"required_access_levels":null,"vpc_network_sources":[]}]}],"custom":[],"description":null,"timeouts":null,"title":"chromeos_no_lock"},"sensitive_values":{"basic":[{"conditions":[{"device_policy":[{"os_constraints":[{}]}],"regions":[false,false,false],"vpc_network_sources":[]}]}],"custom":[]}},{"address":"google_access_context_manager_access_policy.access-policy","mode":"managed","type":"google_access_context_manager_access_policy","name":"access-policy","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"parent":"organizations/123456789","scopes":null,"timeouts":null,"title":"my policy"},"sensitive_values":{}}]}},"resource_changes":[{"address":"google_access_context_manager_access_level.c","mode":"managed","type":"google_access_context_manager_access_level","name":"c","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"basic":[{"combining_function":"AND","conditions":[{"device_policy":[{"allowed_device_management_levels":null,"allowed_encryption_statuses":null,"os_constraints":[],"require_admin_approval":null,"require_corp_owned":null,"require_screen_lock":true}],"ip_subnetworks":null,"members":null,"negate":null,"regions":null,"required_access_levels":null,"vpc_network_sources":[]}]}],"custom":[],"description":null,"timeouts":null,"title":"chromeos_no_lock"},"after_unknown":{"basic":[{"conditions":[{"device_policy":[{"os_constraints":[]}],"vpc_network_sources":[]}]}],"custom":[],"id":true,"name":true,"parent":true},"before_sensitive":false,"after_sensitive":{"basic":[{"conditions":[{"device_policy":[{"os_constraints":[]}],"vpc_network_sources":[]}]}],"custom":[]}}},{"address":"google_access_context_manager_access_level.nc","mode":"managed","type":"google_access_context_manager_access_level","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"basic":[{"combining_function":"AND","conditions":[{"device_policy":[{"allowed_device_management_levels":null,"allowed_encryption_statuses":null,"os_constraints":[{"minimum_version":null,"os_type":"DESKTOP_CHROME_OS","require_verified_chrome_os":null}],"require_admin_approval":null,"require_corp_owned":null,"require_screen_lock":true}],"ip_subnetworks":null,"members":null,"negate":null,"regions":["CH","IT","US"],"required_access_levels":null,"vpc_network_sources":[]}]}],"custom":[],"description":null,"timeouts":null,"title":"chromeos_no_lock"},"after_unknown":{"basic":[{"conditions":[{"device_policy":[{"os_constraints":[{}]}],"regions":[false,false,false],"vpc_network_sources":[]}]}],"custom":[],"id":true,"name":true,"parent":true},"before_sensitive":false,"after_sensitive":{"basic":[{"conditions":[{"device_policy":[{"os_constraints":[{}]}],"regions":[false,false,false],"vpc_network_sources":[]}]}],"custom":[]}}},{"address":"google_access_context_manager_access_policy.access-policy","mode":"managed","type":"google_access_context_manager_access_policy","name":"access-policy","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"parent":"organizations/123456789","scopes":null,"timeouts":null,"title":"my policy"},"after_unknown":{"create_time":true,"id":true,"name":true,"update_time":true},"before_sensitive":false,"after_sensitive":{}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_access_context_manager_access_level.c","mode":"managed","type":"google_access_context_manager_access_level","name":"c","provider_config_key":"google","expressions":{"basic":[{"conditions":[{"device_policy":[{"require_screen_lock":{"constant_value":true}}]}]}],"name":{"references":["google_access_context_manager_access_policy.access-policy.name","google_access_context_manager_access_policy.access-policy"]},"parent":{"references":["google_access_context_manager_access_policy.access-policy.name","google_access_context_manager_access_policy.access-policy"]},"title":{"constant_value":"chromeos_no_lock"}},"schema_version":0},{"address":"google_access_context_manager_access_level.nc","mode":"managed","type":"google_access_context_manager_access_level","name":"nc","provider_config_key":"google","expressions":{"basic":[{"conditions":[{"device_policy":[{"os_constraints":[{"os_type":{"constant_value":"DESKTOP_CHROME_OS"}}],"require_screen_lock":{"constant_value":true}}],"regions":{"constant_value":["CH","IT","US"]}}]}],"name":{"references":["google_access_context_manager_access_policy.access-policy.name","google_access_context_manager_access_policy.access-policy"]},"parent":{"references":["google_access_context_manager_access_policy.access-policy.name","google_access_context_manager_access_policy.access-policy"]},"title":{"constant_value":"chromeos_no_lock"}},"schema_version":0},{"address":"google_access_context_manager_access_policy.access-policy","mode":"managed","type":"google_access_context_manager_access_policy","name":"access-policy","provider_config_key":"google","expressions":{"parent":{"constant_value":"organizations/123456789"},"title":{"constant_value":"my policy"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"google_access_context_manager_access_policy.access-policy","attribute":["name"]}],"timestamp":"2025-12-02T04:18:21Z","applyable":true,"complete":true,"errored":false} +{"format_version":"1.2","terraform_version":"1.13.3","planned_values":{"root_module":{"resources":[{"address":"google_access_context_manager_access_level.c","mode":"managed","type":"google_access_context_manager_access_level","name":"c","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"basic":[{"combining_function":"AND","conditions":[{"device_policy":[{"allowed_device_management_levels":null,"allowed_encryption_statuses":null,"os_constraints":[],"require_admin_approval":null,"require_corp_owned":null,"require_screen_lock":true}],"ip_subnetworks":null,"members":null,"negate":null,"regions":null,"required_access_levels":null,"vpc_network_sources":[]}]}],"custom":[],"description":null,"name":"c","timeouts":null,"title":"c-require-screen-lock"},"sensitive_values":{"basic":[{"conditions":[{"device_policy":[{"os_constraints":[]}],"vpc_network_sources":[]}]}],"custom":[]}},{"address":"google_access_context_manager_access_level.nc","mode":"managed","type":"google_access_context_manager_access_level","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"basic":[{"combining_function":"AND","conditions":[{"device_policy":[{"allowed_device_management_levels":null,"allowed_encryption_statuses":null,"os_constraints":[],"require_admin_approval":null,"require_corp_owned":null,"require_screen_lock":false}],"ip_subnetworks":null,"members":null,"negate":null,"regions":null,"required_access_levels":null,"vpc_network_sources":[]}]}],"custom":[],"description":null,"name":"nc","timeouts":null,"title":"chromeos_no_lock"},"sensitive_values":{"basic":[{"conditions":[{"device_policy":[{"os_constraints":[]}],"vpc_network_sources":[]}]}],"custom":[]}},{"address":"google_access_context_manager_access_policy.access-policy","mode":"managed","type":"google_access_context_manager_access_policy","name":"access-policy","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"parent":"organizations/123456789","scopes":null,"timeouts":null,"title":"my policy"},"sensitive_values":{}}]}},"resource_changes":[{"address":"google_access_context_manager_access_level.c","mode":"managed","type":"google_access_context_manager_access_level","name":"c","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"basic":[{"combining_function":"AND","conditions":[{"device_policy":[{"allowed_device_management_levels":null,"allowed_encryption_statuses":null,"os_constraints":[],"require_admin_approval":null,"require_corp_owned":null,"require_screen_lock":true}],"ip_subnetworks":null,"members":null,"negate":null,"regions":null,"required_access_levels":null,"vpc_network_sources":[]}]}],"custom":[],"description":null,"name":"c","timeouts":null,"title":"c-require-screen-lock"},"after_unknown":{"basic":[{"conditions":[{"device_policy":[{"os_constraints":[]}],"vpc_network_sources":[]}]}],"custom":[],"id":true,"parent":true},"before_sensitive":false,"after_sensitive":{"basic":[{"conditions":[{"device_policy":[{"os_constraints":[]}],"vpc_network_sources":[]}]}],"custom":[]}}},{"address":"google_access_context_manager_access_level.nc","mode":"managed","type":"google_access_context_manager_access_level","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"basic":[{"combining_function":"AND","conditions":[{"device_policy":[{"allowed_device_management_levels":null,"allowed_encryption_statuses":null,"os_constraints":[],"require_admin_approval":null,"require_corp_owned":null,"require_screen_lock":false}],"ip_subnetworks":null,"members":null,"negate":null,"regions":null,"required_access_levels":null,"vpc_network_sources":[]}]}],"custom":[],"description":null,"name":"nc","timeouts":null,"title":"chromeos_no_lock"},"after_unknown":{"basic":[{"conditions":[{"device_policy":[{"os_constraints":[]}],"vpc_network_sources":[]}]}],"custom":[],"id":true,"parent":true},"before_sensitive":false,"after_sensitive":{"basic":[{"conditions":[{"device_policy":[{"os_constraints":[]}],"vpc_network_sources":[]}]}],"custom":[]}}},{"address":"google_access_context_manager_access_policy.access-policy","mode":"managed","type":"google_access_context_manager_access_policy","name":"access-policy","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"parent":"organizations/123456789","scopes":null,"timeouts":null,"title":"my policy"},"after_unknown":{"create_time":true,"id":true,"name":true,"update_time":true},"before_sensitive":false,"after_sensitive":{}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_access_context_manager_access_level.c","mode":"managed","type":"google_access_context_manager_access_level","name":"c","provider_config_key":"google","expressions":{"basic":[{"conditions":[{"device_policy":[{"require_screen_lock":{"constant_value":true}}]}]}],"name":{"constant_value":"c"},"parent":{"references":["google_access_context_manager_access_policy.access-policy.name","google_access_context_manager_access_policy.access-policy"]},"title":{"constant_value":"c-require-screen-lock"}},"schema_version":0},{"address":"google_access_context_manager_access_level.nc","mode":"managed","type":"google_access_context_manager_access_level","name":"nc","provider_config_key":"google","expressions":{"basic":[{"conditions":[{"device_policy":[{"require_screen_lock":{"constant_value":false}}]}]}],"name":{"constant_value":"nc"},"parent":{"references":["google_access_context_manager_access_policy.access-policy.name","google_access_context_manager_access_policy.access-policy"]},"title":{"constant_value":"chromeos_no_lock"}},"schema_version":0},{"address":"google_access_context_manager_access_policy.access-policy","mode":"managed","type":"google_access_context_manager_access_policy","name":"access-policy","provider_config_key":"google","expressions":{"parent":{"constant_value":"organizations/123456789"},"title":{"constant_value":"my policy"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"google_access_context_manager_access_policy.access-policy","attribute":["name"]}],"timestamp":"2026-01-24T01:16:54Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_level_condition/os_type/.terraform.lock.hcl b/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_level_condition/os_type/.terraform.lock.hcl index 653c7021d..9d894e742 100644 --- a/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_level_condition/os_type/.terraform.lock.hcl +++ b/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_level_condition/os_type/.terraform.lock.hcl @@ -5,6 +5,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "7.12.0" hashes = [ "h1:axUhrDS/FeAEKHRKS57WfT0AkrNDC3d5DkWMMnk+fT4=", + "h1:vd1110nYSvbUdAM3MDtQD97ikZvuyDgKExlzTwutYqw=", "zh:38722ec7777543c23e22e02695e53dd5c94644022647c3c79e11e587063d4d2b", "zh:417b12b69c91c12e3fcefee38744b7a37bae73b706e3071c714151a623a6b0e9", "zh:4902cea92c78b462beaf053de03d0d55fb2241d41ca3379b4568ba247f667fa9", diff --git a/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_level_condition/region/.terraform.lock.hcl b/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_level_condition/region/.terraform.lock.hcl index 653c7021d..9d894e742 100644 --- a/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_level_condition/region/.terraform.lock.hcl +++ b/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_level_condition/region/.terraform.lock.hcl @@ -5,6 +5,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "7.12.0" hashes = [ "h1:axUhrDS/FeAEKHRKS57WfT0AkrNDC3d5DkWMMnk+fT4=", + "h1:vd1110nYSvbUdAM3MDtQD97ikZvuyDgKExlzTwutYqw=", "zh:38722ec7777543c23e22e02695e53dd5c94644022647c3c79e11e587063d4d2b", "zh:417b12b69c91c12e3fcefee38744b7a37bae73b706e3071c714151a623a6b0e9", "zh:4902cea92c78b462beaf053de03d0d55fb2241d41ca3379b4568ba247f667fa9", diff --git a/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_level_condition/require_admin_approval/.terraform.lock.hcl b/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_level_condition/require_admin_approval/.terraform.lock.hcl index 653c7021d..9d894e742 100644 --- a/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_level_condition/require_admin_approval/.terraform.lock.hcl +++ b/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_level_condition/require_admin_approval/.terraform.lock.hcl @@ -5,6 +5,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "7.12.0" hashes = [ "h1:axUhrDS/FeAEKHRKS57WfT0AkrNDC3d5DkWMMnk+fT4=", + "h1:vd1110nYSvbUdAM3MDtQD97ikZvuyDgKExlzTwutYqw=", "zh:38722ec7777543c23e22e02695e53dd5c94644022647c3c79e11e587063d4d2b", "zh:417b12b69c91c12e3fcefee38744b7a37bae73b706e3071c714151a623a6b0e9", "zh:4902cea92c78b462beaf053de03d0d55fb2241d41ca3379b4568ba247f667fa9", diff --git a/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_level_condition/require_corp_owned/.terraform.lock.hcl b/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_level_condition/require_corp_owned/.terraform.lock.hcl index 653c7021d..9d894e742 100644 --- a/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_level_condition/require_corp_owned/.terraform.lock.hcl +++ b/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_level_condition/require_corp_owned/.terraform.lock.hcl @@ -5,6 +5,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "7.12.0" hashes = [ "h1:axUhrDS/FeAEKHRKS57WfT0AkrNDC3d5DkWMMnk+fT4=", + "h1:vd1110nYSvbUdAM3MDtQD97ikZvuyDgKExlzTwutYqw=", "zh:38722ec7777543c23e22e02695e53dd5c94644022647c3c79e11e587063d4d2b", "zh:417b12b69c91c12e3fcefee38744b7a37bae73b706e3071c714151a623a6b0e9", "zh:4902cea92c78b462beaf053de03d0d55fb2241d41ca3379b4568ba247f667fa9", diff --git a/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_level_condition/require_screen_lock/.terraform.lock.hcl b/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_level_condition/require_screen_lock/.terraform.lock.hcl index 653c7021d..9d894e742 100644 --- a/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_level_condition/require_screen_lock/.terraform.lock.hcl +++ b/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_level_condition/require_screen_lock/.terraform.lock.hcl @@ -5,6 +5,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "7.12.0" hashes = [ "h1:axUhrDS/FeAEKHRKS57WfT0AkrNDC3d5DkWMMnk+fT4=", + "h1:vd1110nYSvbUdAM3MDtQD97ikZvuyDgKExlzTwutYqw=", "zh:38722ec7777543c23e22e02695e53dd5c94644022647c3c79e11e587063d4d2b", "zh:417b12b69c91c12e3fcefee38744b7a37bae73b706e3071c714151a623a6b0e9", "zh:4902cea92c78b462beaf053de03d0d55fb2241d41ca3379b4568ba247f667fa9", diff --git a/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_levels/os_type/.terraform.lock.hcl b/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_levels/os_type/.terraform.lock.hcl index 653c7021d..9d894e742 100644 --- a/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_levels/os_type/.terraform.lock.hcl +++ b/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_levels/os_type/.terraform.lock.hcl @@ -5,6 +5,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "7.12.0" hashes = [ "h1:axUhrDS/FeAEKHRKS57WfT0AkrNDC3d5DkWMMnk+fT4=", + "h1:vd1110nYSvbUdAM3MDtQD97ikZvuyDgKExlzTwutYqw=", "zh:38722ec7777543c23e22e02695e53dd5c94644022647c3c79e11e587063d4d2b", "zh:417b12b69c91c12e3fcefee38744b7a37bae73b706e3071c714151a623a6b0e9", "zh:4902cea92c78b462beaf053de03d0d55fb2241d41ca3379b4568ba247f667fa9", diff --git a/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_levels/region/.terraform.lock.hcl b/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_levels/region/.terraform.lock.hcl index 653c7021d..9d894e742 100644 --- a/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_levels/region/.terraform.lock.hcl +++ b/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_levels/region/.terraform.lock.hcl @@ -5,6 +5,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "7.12.0" hashes = [ "h1:axUhrDS/FeAEKHRKS57WfT0AkrNDC3d5DkWMMnk+fT4=", + "h1:vd1110nYSvbUdAM3MDtQD97ikZvuyDgKExlzTwutYqw=", "zh:38722ec7777543c23e22e02695e53dd5c94644022647c3c79e11e587063d4d2b", "zh:417b12b69c91c12e3fcefee38744b7a37bae73b706e3071c714151a623a6b0e9", "zh:4902cea92c78b462beaf053de03d0d55fb2241d41ca3379b4568ba247f667fa9", diff --git a/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_levels/require_screen_lock/.terraform.lock.hcl b/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_levels/require_screen_lock/.terraform.lock.hcl index 653c7021d..9d894e742 100644 --- a/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_levels/require_screen_lock/.terraform.lock.hcl +++ b/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_access_levels/require_screen_lock/.terraform.lock.hcl @@ -5,6 +5,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "7.12.0" hashes = [ "h1:axUhrDS/FeAEKHRKS57WfT0AkrNDC3d5DkWMMnk+fT4=", + "h1:vd1110nYSvbUdAM3MDtQD97ikZvuyDgKExlzTwutYqw=", "zh:38722ec7777543c23e22e02695e53dd5c94644022647c3c79e11e587063d4d2b", "zh:417b12b69c91c12e3fcefee38744b7a37bae73b706e3071c714151a623a6b0e9", "zh:4902cea92c78b462beaf053de03d0d55fb2241d41ca3379b4568ba247f667fa9", diff --git a/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_service_perimeter/status/.terraform.lock.hcl b/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_service_perimeter/status/.terraform.lock.hcl index 653c7021d..9d894e742 100644 --- a/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_service_perimeter/status/.terraform.lock.hcl +++ b/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_service_perimeter/status/.terraform.lock.hcl @@ -5,6 +5,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "7.12.0" hashes = [ "h1:axUhrDS/FeAEKHRKS57WfT0AkrNDC3d5DkWMMnk+fT4=", + "h1:vd1110nYSvbUdAM3MDtQD97ikZvuyDgKExlzTwutYqw=", "zh:38722ec7777543c23e22e02695e53dd5c94644022647c3c79e11e587063d4d2b", "zh:417b12b69c91c12e3fcefee38744b7a37bae73b706e3071c714151a623a6b0e9", "zh:4902cea92c78b462beaf053de03d0d55fb2241d41ca3379b4568ba247f667fa9", diff --git a/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_service_perimeter/status/plan.json b/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_service_perimeter/status/plan.json index e1ac4f822..badbb5630 100644 --- a/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_service_perimeter/status/plan.json +++ b/inputs/gcp/access_context_manager_vpc_service_controls/google_access_context_manager_service_perimeter/status/plan.json @@ -1,499 +1 @@ -{ - "format_version": "1.2", - "terraform_version": "1.12.2", - "planned_values": { - "root_module": { - "resources": [ - { - "address": "google_access_context_manager_access_policy.access-policy", - "mode": "managed", - "type": "google_access_context_manager_access_policy", - "name": "access-policy", - "provider_name": "registry.terraform.io/hashicorp/google", - "schema_version": 0, - "values": { - "parent": "organizations/123456789", - "scopes": null, - "timeouts": null, - "title": "my policy" - }, - "sensitive_values": {} - }, - { - "address": "google_access_context_manager_service_perimeter.c", - "mode": "managed", - "type": "google_access_context_manager_service_perimeter", - "name": "c", - "provider_name": "registry.terraform.io/hashicorp/google", - "schema_version": 0, - "values": { - "description": null, - "perimeter_type": "PERIMETER_TYPE_REGULAR", - "spec": [], - "status": [ - { - "access_levels": null, - "egress_policies": [], - "ingress_policies": [], - "resources": null, - "restricted_services": [ - "storage.googleapis.com" - ], - "vpc_accessible_services": [] - } - ], - "timeouts": null, - "title": "restrict_storage", - "use_explicit_dry_run_spec": null - }, - "sensitive_values": { - "spec": [], - "status": [ - { - "egress_policies": [], - "ingress_policies": [], - "restricted_services": [ - false - ], - "vpc_accessible_services": [] - } - ] - } - }, - { - "address": "google_access_context_manager_service_perimeter.nc-null-restricted-services", - "mode": "managed", - "type": "google_access_context_manager_service_perimeter", - "name": "nc-null-restricted-services", - "provider_name": "registry.terraform.io/hashicorp/google", - "schema_version": 0, - "values": { - "description": null, - "perimeter_type": "PERIMETER_TYPE_REGULAR", - "spec": [], - "status": [ - { - "access_levels": null, - "egress_policies": [], - "ingress_policies": [], - "resources": null, - "restricted_services": null, - "vpc_accessible_services": [] - } - ], - "timeouts": null, - "title": "restrict_storage", - "use_explicit_dry_run_spec": null - }, - "sensitive_values": { - "spec": [], - "status": [ - { - "egress_policies": [], - "ingress_policies": [], - "vpc_accessible_services": [] - } - ] - } - }, - { - "address": "google_access_context_manager_service_perimeter.nc-permissive-restricted-services", - "mode": "managed", - "type": "google_access_context_manager_service_perimeter", - "name": "nc-permissive-restricted-services", - "provider_name": "registry.terraform.io/hashicorp/google", - "schema_version": 0, - "values": { - "description": null, - "perimeter_type": "PERIMETER_TYPE_REGULAR", - "spec": [], - "status": [ - { - "access_levels": null, - "egress_policies": [], - "ingress_policies": [], - "resources": null, - "restricted_services": [ - "*.googleapis.com" - ], - "vpc_accessible_services": [] - } - ], - "timeouts": null, - "title": "restrict_storage", - "use_explicit_dry_run_spec": null - }, - "sensitive_values": { - "spec": [], - "status": [ - { - "egress_policies": [], - "ingress_policies": [], - "restricted_services": [ - false - ], - "vpc_accessible_services": [] - } - ] - } - } - ] - } - }, - "resource_changes": [ - { - "address": "google_access_context_manager_access_policy.access-policy", - "mode": "managed", - "type": "google_access_context_manager_access_policy", - "name": "access-policy", - "provider_name": "registry.terraform.io/hashicorp/google", - "change": { - "actions": [ - "create" - ], - "before": null, - "after": { - "parent": "organizations/123456789", - "scopes": null, - "timeouts": null, - "title": "my policy" - }, - "after_unknown": { - "create_time": true, - "id": true, - "name": true, - "update_time": true - }, - "before_sensitive": false, - "after_sensitive": {} - } - }, - { - "address": "google_access_context_manager_service_perimeter.c", - "mode": "managed", - "type": "google_access_context_manager_service_perimeter", - "name": "c", - "provider_name": "registry.terraform.io/hashicorp/google", - "change": { - "actions": [ - "create" - ], - "before": null, - "after": { - "description": null, - "perimeter_type": "PERIMETER_TYPE_REGULAR", - "spec": [], - "status": [ - { - "access_levels": null, - "egress_policies": [], - "ingress_policies": [], - "resources": null, - "restricted_services": [ - "storage.googleapis.com" - ], - "vpc_accessible_services": [] - } - ], - "timeouts": null, - "title": "restrict_storage", - "use_explicit_dry_run_spec": null - }, - "after_unknown": { - "create_time": true, - "id": true, - "name": true, - "parent": true, - "spec": [], - "status": [ - { - "egress_policies": [], - "ingress_policies": [], - "restricted_services": [ - false - ], - "vpc_accessible_services": [] - } - ], - "update_time": true - }, - "before_sensitive": false, - "after_sensitive": { - "spec": [], - "status": [ - { - "egress_policies": [], - "ingress_policies": [], - "restricted_services": [ - false - ], - "vpc_accessible_services": [] - } - ] - } - } - }, - { - "address": "google_access_context_manager_service_perimeter.nc-null-restricted-services", - "mode": "managed", - "type": "google_access_context_manager_service_perimeter", - "name": "nc-null-restricted-services", - "provider_name": "registry.terraform.io/hashicorp/google", - "change": { - "actions": [ - "create" - ], - "before": null, - "after": { - "description": null, - "perimeter_type": "PERIMETER_TYPE_REGULAR", - "spec": [], - "status": [ - { - "access_levels": null, - "egress_policies": [], - "ingress_policies": [], - "resources": null, - "restricted_services": null, - "vpc_accessible_services": [] - } - ], - "timeouts": null, - "title": "restrict_storage", - "use_explicit_dry_run_spec": null - }, - "after_unknown": { - "create_time": true, - "id": true, - "name": true, - "parent": true, - "spec": [], - "status": [ - { - "egress_policies": [], - "ingress_policies": [], - "vpc_accessible_services": [] - } - ], - "update_time": true - }, - "before_sensitive": false, - "after_sensitive": { - "spec": [], - "status": [ - { - "egress_policies": [], - "ingress_policies": [], - "vpc_accessible_services": [] - } - ] - } - } - }, - { - "address": "google_access_context_manager_service_perimeter.nc-permissive-restricted-services", - "mode": "managed", - "type": "google_access_context_manager_service_perimeter", - "name": "nc-permissive-restricted-services", - "provider_name": "registry.terraform.io/hashicorp/google", - "change": { - "actions": [ - "create" - ], - "before": null, - "after": { - "description": null, - "perimeter_type": "PERIMETER_TYPE_REGULAR", - "spec": [], - "status": [ - { - "access_levels": null, - "egress_policies": [], - "ingress_policies": [], - "resources": null, - "restricted_services": [ - "*.googleapis.com" - ], - "vpc_accessible_services": [] - } - ], - "timeouts": null, - "title": "restrict_storage", - "use_explicit_dry_run_spec": null - }, - "after_unknown": { - "create_time": true, - "id": true, - "name": true, - "parent": true, - "spec": [], - "status": [ - { - "egress_policies": [], - "ingress_policies": [], - "restricted_services": [ - false - ], - "vpc_accessible_services": [] - } - ], - "update_time": true - }, - "before_sensitive": false, - "after_sensitive": { - "spec": [], - "status": [ - { - "egress_policies": [], - "ingress_policies": [], - "restricted_services": [ - false - ], - "vpc_accessible_services": [] - } - ] - } - } - } - ], - "configuration": { - "provider_config": { - "google": { - "name": "google", - "full_name": "registry.terraform.io/hashicorp/google" - } - }, - "root_module": { - "resources": [ - { - "address": "google_access_context_manager_access_policy.access-policy", - "mode": "managed", - "type": "google_access_context_manager_access_policy", - "name": "access-policy", - "provider_config_key": "google", - "expressions": { - "parent": { - "constant_value": "organizations/123456789" - }, - "title": { - "constant_value": "my policy" - } - }, - "schema_version": 0 - }, - { - "address": "google_access_context_manager_service_perimeter.c", - "mode": "managed", - "type": "google_access_context_manager_service_perimeter", - "name": "c", - "provider_config_key": "google", - "expressions": { - "name": { - "references": [ - "google_access_context_manager_access_policy.access-policy.name", - "google_access_context_manager_access_policy.access-policy" - ] - }, - "parent": { - "references": [ - "google_access_context_manager_access_policy.access-policy.name", - "google_access_context_manager_access_policy.access-policy" - ] - }, - "status": [ - { - "restricted_services": { - "constant_value": [ - "storage.googleapis.com" - ] - } - } - ], - "title": { - "constant_value": "restrict_storage" - } - }, - "schema_version": 0 - }, - { - "address": "google_access_context_manager_service_perimeter.nc-null-restricted-services", - "mode": "managed", - "type": "google_access_context_manager_service_perimeter", - "name": "nc-null-restricted-services", - "provider_config_key": "google", - "expressions": { - "name": { - "references": [ - "google_access_context_manager_access_policy.access-policy.name", - "google_access_context_manager_access_policy.access-policy" - ] - }, - "parent": { - "references": [ - "google_access_context_manager_access_policy.access-policy.name", - "google_access_context_manager_access_policy.access-policy" - ] - }, - "status": [ - { - "restricted_services": { - "constant_value": [] - } - } - ], - "title": { - "constant_value": "restrict_storage" - } - }, - "schema_version": 0 - }, - { - "address": "google_access_context_manager_service_perimeter.nc-permissive-restricted-services", - "mode": "managed", - "type": "google_access_context_manager_service_perimeter", - "name": "nc-permissive-restricted-services", - "provider_config_key": "google", - "expressions": { - "name": { - "references": [ - "google_access_context_manager_access_policy.access-policy.name", - "google_access_context_manager_access_policy.access-policy" - ] - }, - "parent": { - "references": [ - "google_access_context_manager_access_policy.access-policy.name", - "google_access_context_manager_access_policy.access-policy" - ] - }, - "status": [ - { - "restricted_services": { - "constant_value": [ - "*.googleapis.com" - ] - } - } - ], - "title": { - "constant_value": "restrict_storage" - } - }, - "schema_version": 0 - } - ] - } - }, - "relevant_attributes": [ - { - "resource": "google_access_context_manager_access_policy.access-policy", - "attribute": [ - "name" - ] - } - ], - "timestamp": "2025-11-23T02:10:56Z", - "applyable": true, - "complete": true, - "errored": false -} \ No newline at end of file +{"format_version":"1.2","terraform_version":"1.13.3","planned_values":{"root_module":{"resources":[{"address":"google_access_context_manager_access_policy.access-policy","mode":"managed","type":"google_access_context_manager_access_policy","name":"access-policy","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"parent":"organizations/123456789","scopes":null,"timeouts":null,"title":"my policy"},"sensitive_values":{}},{"address":"google_access_context_manager_service_perimeter.c","mode":"managed","type":"google_access_context_manager_service_perimeter","name":"c","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"description":null,"name":"c","perimeter_type":"PERIMETER_TYPE_REGULAR","spec":[],"status":[{"access_levels":null,"egress_policies":[],"ingress_policies":[],"resources":null,"restricted_services":["storage.googleapis.com"],"vpc_accessible_services":[]}],"timeouts":null,"title":"restrict_storage","use_explicit_dry_run_spec":null},"sensitive_values":{"spec":[],"status":[{"egress_policies":[],"ingress_policies":[],"restricted_services":[false],"vpc_accessible_services":[]}]}},{"address":"google_access_context_manager_service_perimeter.nc1","mode":"managed","type":"google_access_context_manager_service_perimeter","name":"nc1","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"description":null,"name":"nc1","perimeter_type":"PERIMETER_TYPE_REGULAR","spec":[],"status":[{"access_levels":null,"egress_policies":[],"ingress_policies":[],"resources":null,"restricted_services":null,"vpc_accessible_services":[]}],"timeouts":null,"title":"restrict_storage","use_explicit_dry_run_spec":null},"sensitive_values":{"spec":[],"status":[{"egress_policies":[],"ingress_policies":[],"vpc_accessible_services":[]}]}},{"address":"google_access_context_manager_service_perimeter.nc2","mode":"managed","type":"google_access_context_manager_service_perimeter","name":"nc2","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"description":null,"name":"nc2","perimeter_type":"PERIMETER_TYPE_REGULAR","spec":[],"status":[{"access_levels":null,"egress_policies":[],"ingress_policies":[],"resources":null,"restricted_services":["*.googleapis.com"],"vpc_accessible_services":[]}],"timeouts":null,"title":"restrict_storage","use_explicit_dry_run_spec":null},"sensitive_values":{"spec":[],"status":[{"egress_policies":[],"ingress_policies":[],"restricted_services":[false],"vpc_accessible_services":[]}]}}]}},"resource_changes":[{"address":"google_access_context_manager_access_policy.access-policy","mode":"managed","type":"google_access_context_manager_access_policy","name":"access-policy","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"parent":"organizations/123456789","scopes":null,"timeouts":null,"title":"my policy"},"after_unknown":{"create_time":true,"id":true,"name":true,"update_time":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"google_access_context_manager_service_perimeter.c","mode":"managed","type":"google_access_context_manager_service_perimeter","name":"c","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"description":null,"name":"c","perimeter_type":"PERIMETER_TYPE_REGULAR","spec":[],"status":[{"access_levels":null,"egress_policies":[],"ingress_policies":[],"resources":null,"restricted_services":["storage.googleapis.com"],"vpc_accessible_services":[]}],"timeouts":null,"title":"restrict_storage","use_explicit_dry_run_spec":null},"after_unknown":{"create_time":true,"id":true,"parent":true,"spec":[],"status":[{"egress_policies":[],"ingress_policies":[],"restricted_services":[false],"vpc_accessible_services":[]}],"update_time":true},"before_sensitive":false,"after_sensitive":{"spec":[],"status":[{"egress_policies":[],"ingress_policies":[],"restricted_services":[false],"vpc_accessible_services":[]}]}}},{"address":"google_access_context_manager_service_perimeter.nc1","mode":"managed","type":"google_access_context_manager_service_perimeter","name":"nc1","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"description":null,"name":"nc1","perimeter_type":"PERIMETER_TYPE_REGULAR","spec":[],"status":[{"access_levels":null,"egress_policies":[],"ingress_policies":[],"resources":null,"restricted_services":null,"vpc_accessible_services":[]}],"timeouts":null,"title":"restrict_storage","use_explicit_dry_run_spec":null},"after_unknown":{"create_time":true,"id":true,"parent":true,"spec":[],"status":[{"egress_policies":[],"ingress_policies":[],"vpc_accessible_services":[]}],"update_time":true},"before_sensitive":false,"after_sensitive":{"spec":[],"status":[{"egress_policies":[],"ingress_policies":[],"vpc_accessible_services":[]}]}}},{"address":"google_access_context_manager_service_perimeter.nc2","mode":"managed","type":"google_access_context_manager_service_perimeter","name":"nc2","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"description":null,"name":"nc2","perimeter_type":"PERIMETER_TYPE_REGULAR","spec":[],"status":[{"access_levels":null,"egress_policies":[],"ingress_policies":[],"resources":null,"restricted_services":["*.googleapis.com"],"vpc_accessible_services":[]}],"timeouts":null,"title":"restrict_storage","use_explicit_dry_run_spec":null},"after_unknown":{"create_time":true,"id":true,"parent":true,"spec":[],"status":[{"egress_policies":[],"ingress_policies":[],"restricted_services":[false],"vpc_accessible_services":[]}],"update_time":true},"before_sensitive":false,"after_sensitive":{"spec":[],"status":[{"egress_policies":[],"ingress_policies":[],"restricted_services":[false],"vpc_accessible_services":[]}]}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_access_context_manager_access_policy.access-policy","mode":"managed","type":"google_access_context_manager_access_policy","name":"access-policy","provider_config_key":"google","expressions":{"parent":{"constant_value":"organizations/123456789"},"title":{"constant_value":"my policy"}},"schema_version":0},{"address":"google_access_context_manager_service_perimeter.c","mode":"managed","type":"google_access_context_manager_service_perimeter","name":"c","provider_config_key":"google","expressions":{"name":{"constant_value":"c"},"parent":{"references":["google_access_context_manager_access_policy.access-policy.name","google_access_context_manager_access_policy.access-policy"]},"status":[{"restricted_services":{"constant_value":["storage.googleapis.com"]}}],"title":{"constant_value":"restrict_storage"}},"schema_version":0},{"address":"google_access_context_manager_service_perimeter.nc1","mode":"managed","type":"google_access_context_manager_service_perimeter","name":"nc1","provider_config_key":"google","expressions":{"name":{"constant_value":"nc1"},"parent":{"references":["google_access_context_manager_access_policy.access-policy.name","google_access_context_manager_access_policy.access-policy"]},"status":[{"restricted_services":{"constant_value":[]}}],"title":{"constant_value":"restrict_storage"}},"schema_version":0},{"address":"google_access_context_manager_service_perimeter.nc2","mode":"managed","type":"google_access_context_manager_service_perimeter","name":"nc2","provider_config_key":"google","expressions":{"name":{"constant_value":"nc2"},"parent":{"references":["google_access_context_manager_access_policy.access-policy.name","google_access_context_manager_access_policy.access-policy"]},"status":[{"restricted_services":{"constant_value":["*.googleapis.com"]}}],"title":{"constant_value":"restrict_storage"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"google_access_context_manager_access_policy.access-policy","attribute":["name"]}],"timestamp":"2026-01-24T01:17:07Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/api_gateway/google_api_gateway_api/labels/plan.json b/inputs/gcp/api_gateway/google_api_gateway_api/labels/plan.json deleted file mode 100644 index 2b26a3bb0..000000000 Binary files a/inputs/gcp/api_gateway/google_api_gateway_api/labels/plan.json and /dev/null differ diff --git a/inputs/gcp/api_gateway/google_api_gateway_api_config/labels/plan.json b/inputs/gcp/api_gateway/google_api_gateway_api_config/labels/plan.json deleted file mode 100644 index 145d60881..000000000 Binary files a/inputs/gcp/api_gateway/google_api_gateway_api_config/labels/plan.json and /dev/null differ diff --git a/inputs/gcp/api_gateway/google_api_gateway_api_config_iam_binding/members/plan.json b/inputs/gcp/api_gateway/google_api_gateway_api_config_iam_binding/members/plan.json deleted file mode 100644 index e6dcb0630..000000000 Binary files a/inputs/gcp/api_gateway/google_api_gateway_api_config_iam_binding/members/plan.json and /dev/null differ diff --git a/inputs/gcp/api_gateway/google_api_gateway_api_config_iam_binding/role/plan.json b/inputs/gcp/api_gateway/google_api_gateway_api_config_iam_binding/role/plan.json deleted file mode 100644 index 9ea7c3a1a..000000000 Binary files a/inputs/gcp/api_gateway/google_api_gateway_api_config_iam_binding/role/plan.json and /dev/null differ diff --git a/inputs/gcp/api_gateway/google_api_gateway_api_config_iam_member/member/plan.json b/inputs/gcp/api_gateway/google_api_gateway_api_config_iam_member/member/plan.json deleted file mode 100644 index f09cd7b7e..000000000 Binary files a/inputs/gcp/api_gateway/google_api_gateway_api_config_iam_member/member/plan.json and /dev/null differ diff --git a/inputs/gcp/api_gateway/google_api_gateway_api_config_iam_member/role/plan.json b/inputs/gcp/api_gateway/google_api_gateway_api_config_iam_member/role/plan.json deleted file mode 100644 index 700761d48..000000000 Binary files a/inputs/gcp/api_gateway/google_api_gateway_api_config_iam_member/role/plan.json and /dev/null differ diff --git a/inputs/gcp/api_gateway/google_api_gateway_api_config_iam_policy/members/plan.json b/inputs/gcp/api_gateway/google_api_gateway_api_config_iam_policy/members/plan.json deleted file mode 100644 index 7dac80c27..000000000 Binary files a/inputs/gcp/api_gateway/google_api_gateway_api_config_iam_policy/members/plan.json and /dev/null differ diff --git a/inputs/gcp/api_gateway/google_api_gateway_api_config_iam_policy/role/plan.json b/inputs/gcp/api_gateway/google_api_gateway_api_config_iam_policy/role/plan.json deleted file mode 100644 index ac70e8609..000000000 Binary files a/inputs/gcp/api_gateway/google_api_gateway_api_config_iam_policy/role/plan.json and /dev/null differ diff --git a/inputs/gcp/api_gateway/google_api_gateway_api_iam_binding/members/plan.json b/inputs/gcp/api_gateway/google_api_gateway_api_iam_binding/members/plan.json deleted file mode 100644 index 8ad19022a..000000000 Binary files a/inputs/gcp/api_gateway/google_api_gateway_api_iam_binding/members/plan.json and /dev/null differ diff --git a/inputs/gcp/api_gateway/google_api_gateway_api_iam_binding/role/plan.json b/inputs/gcp/api_gateway/google_api_gateway_api_iam_binding/role/plan.json deleted file mode 100644 index f2f11046b..000000000 Binary files a/inputs/gcp/api_gateway/google_api_gateway_api_iam_binding/role/plan.json and /dev/null differ diff --git a/inputs/gcp/api_gateway/google_api_gateway_api_iam_member/member/plan.json b/inputs/gcp/api_gateway/google_api_gateway_api_iam_member/member/plan.json deleted file mode 100644 index 33ee19f5c..000000000 Binary files a/inputs/gcp/api_gateway/google_api_gateway_api_iam_member/member/plan.json and /dev/null differ diff --git a/inputs/gcp/api_gateway/google_api_gateway_api_iam_member/role/plan.json b/inputs/gcp/api_gateway/google_api_gateway_api_iam_member/role/plan.json deleted file mode 100644 index bf04a99e4..000000000 Binary files a/inputs/gcp/api_gateway/google_api_gateway_api_iam_member/role/plan.json and /dev/null differ diff --git a/inputs/gcp/api_gateway/google_api_gateway_api_iam_policy/members/plan.json b/inputs/gcp/api_gateway/google_api_gateway_api_iam_policy/members/plan.json deleted file mode 100644 index 962c43b0e..000000000 Binary files a/inputs/gcp/api_gateway/google_api_gateway_api_iam_policy/members/plan.json and /dev/null differ diff --git a/inputs/gcp/api_gateway/google_api_gateway_api_iam_policy/role/plan.json b/inputs/gcp/api_gateway/google_api_gateway_api_iam_policy/role/plan.json deleted file mode 100644 index 4823c08d1..000000000 Binary files a/inputs/gcp/api_gateway/google_api_gateway_api_iam_policy/role/plan.json and /dev/null differ diff --git a/inputs/gcp/api_gateway/google_api_gateway_gateway_iam_binding/members/plan.json b/inputs/gcp/api_gateway/google_api_gateway_gateway_iam_binding/members/plan.json deleted file mode 100644 index 3147d7989..000000000 Binary files a/inputs/gcp/api_gateway/google_api_gateway_gateway_iam_binding/members/plan.json and /dev/null differ diff --git a/inputs/gcp/api_gateway/google_api_gateway_gateway_iam_binding/role/plan.json b/inputs/gcp/api_gateway/google_api_gateway_gateway_iam_binding/role/plan.json deleted file mode 100644 index 2ff52a96c..000000000 Binary files a/inputs/gcp/api_gateway/google_api_gateway_gateway_iam_binding/role/plan.json and /dev/null differ diff --git a/inputs/gcp/api_gateway/google_api_gateway_gateway_iam_member/member/plan.json b/inputs/gcp/api_gateway/google_api_gateway_gateway_iam_member/member/plan.json deleted file mode 100644 index 40c8011c2..000000000 Binary files a/inputs/gcp/api_gateway/google_api_gateway_gateway_iam_member/member/plan.json and /dev/null differ diff --git a/inputs/gcp/api_gateway/google_api_gateway_gateway_iam_member/role/plan.json b/inputs/gcp/api_gateway/google_api_gateway_gateway_iam_member/role/plan.json deleted file mode 100644 index ccad54de0..000000000 Binary files a/inputs/gcp/api_gateway/google_api_gateway_gateway_iam_member/role/plan.json and /dev/null differ diff --git a/inputs/gcp/api_gateway/google_api_gateway_gateway_iam_policy/members/plan.json b/inputs/gcp/api_gateway/google_api_gateway_gateway_iam_policy/members/plan.json deleted file mode 100644 index fa57e37a4..000000000 Binary files a/inputs/gcp/api_gateway/google_api_gateway_gateway_iam_policy/members/plan.json and /dev/null differ diff --git a/inputs/gcp/api_gateway/google_api_gateway_gateway_iam_policy/role/plan.json b/inputs/gcp/api_gateway/google_api_gateway_gateway_iam_policy/role/plan.json deleted file mode 100644 index 68c436152..000000000 Binary files a/inputs/gcp/api_gateway/google_api_gateway_gateway_iam_policy/role/plan.json and /dev/null differ diff --git a/inputs/gcp/api_hub/google_apihub_api_hub_instance/disable_search/.terraform.lock.hcl b/inputs/gcp/api_hub/google_apihub_api_hub_instance/disable_search/.terraform.lock.hcl new file mode 100644 index 000000000..fb70c16e3 --- /dev/null +++ b/inputs/gcp/api_hub/google_apihub_api_hub_instance/disable_search/.terraform.lock.hcl @@ -0,0 +1,21 @@ +# This file is maintained automatically by "terraform init". +# Manual edits may be lost in future updates. + +provider "registry.terraform.io/hashicorp/google" { + version = "7.14.1" + hashes = [ + "h1:T3ZZsRvZxmFd9e945+QPH6Fpz2y3AM0qewPaceNyjEA=", + "zh:0006182db112098af8514fc38d9cd4e816da4145a2a0b9fb62cc9e281eb2b2a1", + "zh:60311d9770ca26c549af9a964ee6cb60ce7541b52fedfaf5f112b0931e6bcce1", + "zh:65b400c0718f6b7c5cd0fba1b2e3696d5f4f69868229627b11b0b2b94b613ade", + "zh:9ec00812dc750687610140f9a97c374492ef320eddcb669b154e1d2e8714f7f3", + "zh:adaf0486d68da121886992a3762cedffa86b611fa43294359b2a569044c462a7", + "zh:ba95c0d8279dd8e7b9294e521e461d4adaa7c171b00502be197b6c7ff4f07d65", + "zh:c216ca4b350a90c4e74e3f502ef3f35617cdd5c278e2b04ecba2bca980fb5e96", + "zh:dd7991a71477dee46c7c57f60775341524271c425ab04e66d8f2762f9b4763eb", + "zh:dd7b63b40e67b073d2acb32ee60099d884ce75bf1152a307422c47358054d170", + "zh:e5d601ca4ab813c51d897e4c2e80bf3e3565c0dd4f37f85bb91964e90ca92dfe", + "zh:f12d8f91ed783ffac9ed8d6c331e0cbe5189455fe352ba633b171b366f52e2cd", + "zh:f569b65999264a9416862bca5cd2a6177d94ccb0424f3a4ef424428912b9cb3c", + ] +} diff --git a/inputs/gcp/api_hub/google_apihub_curation/location/.terraform.lock.hcl b/inputs/gcp/api_hub/google_apihub_curation/location/.terraform.lock.hcl new file mode 100644 index 000000000..fb70c16e3 --- /dev/null +++ b/inputs/gcp/api_hub/google_apihub_curation/location/.terraform.lock.hcl @@ -0,0 +1,21 @@ +# This file is maintained automatically by "terraform init". +# Manual edits may be lost in future updates. + +provider "registry.terraform.io/hashicorp/google" { + version = "7.14.1" + hashes = [ + "h1:T3ZZsRvZxmFd9e945+QPH6Fpz2y3AM0qewPaceNyjEA=", + "zh:0006182db112098af8514fc38d9cd4e816da4145a2a0b9fb62cc9e281eb2b2a1", + "zh:60311d9770ca26c549af9a964ee6cb60ce7541b52fedfaf5f112b0931e6bcce1", + "zh:65b400c0718f6b7c5cd0fba1b2e3696d5f4f69868229627b11b0b2b94b613ade", + "zh:9ec00812dc750687610140f9a97c374492ef320eddcb669b154e1d2e8714f7f3", + "zh:adaf0486d68da121886992a3762cedffa86b611fa43294359b2a569044c462a7", + "zh:ba95c0d8279dd8e7b9294e521e461d4adaa7c171b00502be197b6c7ff4f07d65", + "zh:c216ca4b350a90c4e74e3f502ef3f35617cdd5c278e2b04ecba2bca980fb5e96", + "zh:dd7991a71477dee46c7c57f60775341524271c425ab04e66d8f2762f9b4763eb", + "zh:dd7b63b40e67b073d2acb32ee60099d884ce75bf1152a307422c47358054d170", + "zh:e5d601ca4ab813c51d897e4c2e80bf3e3565c0dd4f37f85bb91964e90ca92dfe", + "zh:f12d8f91ed783ffac9ed8d6c331e0cbe5189455fe352ba633b171b366f52e2cd", + "zh:f569b65999264a9416862bca5cd2a6177d94ccb0424f3a4ef424428912b9cb3c", + ] +} diff --git a/inputs/gcp/beyondcorp/google_beyondcorp_app_connection/region_whitelist/plan b/inputs/gcp/beyondcorp/google_beyondcorp_app_connection/region_whitelist/plan deleted file mode 100644 index 905854271..000000000 Binary files a/inputs/gcp/beyondcorp/google_beyondcorp_app_connection/region_whitelist/plan and /dev/null differ diff --git a/inputs/gcp/beyondcorp/google_beyondcorp_app_connector/region_whitelist/plan b/inputs/gcp/beyondcorp/google_beyondcorp_app_connector/region_whitelist/plan deleted file mode 100644 index 9484b2328..000000000 Binary files a/inputs/gcp/beyondcorp/google_beyondcorp_app_connector/region_whitelist/plan and /dev/null differ diff --git a/inputs/gcp/beyondcorp/google_beyondcorp_app_connector/region_whitelist/plan.json b/inputs/gcp/beyondcorp/google_beyondcorp_app_connector/region_whitelist/plan.json deleted file mode 100644 index 5a4a41dd4..000000000 Binary files a/inputs/gcp/beyondcorp/google_beyondcorp_app_connector/region_whitelist/plan.json and /dev/null differ diff --git a/inputs/gcp/beyondcorp/google_beyondcorp_app_gateway/host_type_whitelist/plan b/inputs/gcp/beyondcorp/google_beyondcorp_app_gateway/host_type_whitelist/plan deleted file mode 100644 index c3a5a1fb9..000000000 Binary files a/inputs/gcp/beyondcorp/google_beyondcorp_app_gateway/host_type_whitelist/plan and /dev/null differ diff --git a/inputs/gcp/beyondcorp/google_beyondcorp_app_gateway/host_type_whitelist/plan.json b/inputs/gcp/beyondcorp/google_beyondcorp_app_gateway/host_type_whitelist/plan.json deleted file mode 100644 index 814eb540b..000000000 Binary files a/inputs/gcp/beyondcorp/google_beyondcorp_app_gateway/host_type_whitelist/plan.json and /dev/null differ diff --git a/inputs/gcp/beyondcorp/google_beyondcorp_app_gateway/region_whitelist/plan b/inputs/gcp/beyondcorp/google_beyondcorp_app_gateway/region_whitelist/plan deleted file mode 100644 index 73062e599..000000000 Binary files a/inputs/gcp/beyondcorp/google_beyondcorp_app_gateway/region_whitelist/plan and /dev/null differ diff --git a/inputs/gcp/beyondcorp/google_beyondcorp_app_gateway/region_whitelist/plan.json b/inputs/gcp/beyondcorp/google_beyondcorp_app_gateway/region_whitelist/plan.json deleted file mode 100644 index a0d0027cb..000000000 Binary files a/inputs/gcp/beyondcorp/google_beyondcorp_app_gateway/region_whitelist/plan.json and /dev/null differ diff --git a/inputs/gcp/beyondcorp/google_beyondcorp_security_gateway/hubs_region_whitelist/plan b/inputs/gcp/beyondcorp/google_beyondcorp_security_gateway/hubs_region_whitelist/plan deleted file mode 100644 index 1443f5163..000000000 Binary files a/inputs/gcp/beyondcorp/google_beyondcorp_security_gateway/hubs_region_whitelist/plan and /dev/null differ diff --git a/inputs/gcp/beyondcorp/google_beyondcorp_security_gateway/hubs_region_whitelist/plan.json b/inputs/gcp/beyondcorp/google_beyondcorp_security_gateway/hubs_region_whitelist/plan.json deleted file mode 100644 index 960d6d088..000000000 Binary files a/inputs/gcp/beyondcorp/google_beyondcorp_security_gateway/hubs_region_whitelist/plan.json and /dev/null differ diff --git a/inputs/gcp/beyondcorp/google_beyondcorp_security_gateway_application/endpoint_hostname_whitelist/plan b/inputs/gcp/beyondcorp/google_beyondcorp_security_gateway_application/endpoint_hostname_whitelist/plan deleted file mode 100644 index c755f48e1..000000000 Binary files a/inputs/gcp/beyondcorp/google_beyondcorp_security_gateway_application/endpoint_hostname_whitelist/plan and /dev/null differ diff --git a/inputs/gcp/beyondcorp/google_beyondcorp_security_gateway_application/endpoint_hostname_whitelist/plan.json b/inputs/gcp/beyondcorp/google_beyondcorp_security_gateway_application/endpoint_hostname_whitelist/plan.json deleted file mode 100644 index bbadcbdb1..000000000 Binary files a/inputs/gcp/beyondcorp/google_beyondcorp_security_gateway_application/endpoint_hostname_whitelist/plan.json and /dev/null differ diff --git a/inputs/gcp/beyondcorp/google_beyondcorp_security_gateway_application/upstreams_whitelist/plan b/inputs/gcp/beyondcorp/google_beyondcorp_security_gateway_application/upstreams_whitelist/plan deleted file mode 100644 index b72a1e0b2..000000000 Binary files a/inputs/gcp/beyondcorp/google_beyondcorp_security_gateway_application/upstreams_whitelist/plan and /dev/null differ diff --git a/inputs/gcp/beyondcorp/google_beyondcorp_security_gateway_application/upstreams_whitelist/plan.json b/inputs/gcp/beyondcorp/google_beyondcorp_security_gateway_application/upstreams_whitelist/plan.json deleted file mode 100644 index 828963239..000000000 Binary files a/inputs/gcp/beyondcorp/google_beyondcorp_security_gateway_application/upstreams_whitelist/plan.json and /dev/null differ diff --git a/inputs/gcp/beyondcorp/google_beyondcorp_security_gateway_application_iam_binding/public_access_prevention/plan b/inputs/gcp/beyondcorp/google_beyondcorp_security_gateway_application_iam_binding/public_access_prevention/plan deleted file mode 100644 index 7db1ea297..000000000 Binary files a/inputs/gcp/beyondcorp/google_beyondcorp_security_gateway_application_iam_binding/public_access_prevention/plan and /dev/null differ diff --git a/inputs/gcp/beyondcorp/google_beyondcorp_security_gateway_application_iam_binding/public_access_prevention/plan.json b/inputs/gcp/beyondcorp/google_beyondcorp_security_gateway_application_iam_binding/public_access_prevention/plan.json deleted file mode 100644 index 9bf2c53e7..000000000 Binary files a/inputs/gcp/beyondcorp/google_beyondcorp_security_gateway_application_iam_binding/public_access_prevention/plan.json and /dev/null differ diff --git a/inputs/gcp/beyondcorp/google_beyondcorp_security_gateway_application_iam_member/public_access_prevention/plan b/inputs/gcp/beyondcorp/google_beyondcorp_security_gateway_application_iam_member/public_access_prevention/plan deleted file mode 100644 index fce870e8b..000000000 Binary files a/inputs/gcp/beyondcorp/google_beyondcorp_security_gateway_application_iam_member/public_access_prevention/plan and /dev/null differ diff --git a/inputs/gcp/beyondcorp/google_beyondcorp_security_gateway_application_iam_member/public_access_prevention/plan.json b/inputs/gcp/beyondcorp/google_beyondcorp_security_gateway_application_iam_member/public_access_prevention/plan.json deleted file mode 100644 index cdeede782..000000000 Binary files a/inputs/gcp/beyondcorp/google_beyondcorp_security_gateway_application_iam_member/public_access_prevention/plan.json and /dev/null differ diff --git a/inputs/gcp/beyondcorp/google_beyondcorp_security_gateway_iam_binding/public_access_prevention/plan b/inputs/gcp/beyondcorp/google_beyondcorp_security_gateway_iam_binding/public_access_prevention/plan deleted file mode 100644 index 07b97e255..000000000 Binary files a/inputs/gcp/beyondcorp/google_beyondcorp_security_gateway_iam_binding/public_access_prevention/plan and /dev/null differ diff --git a/inputs/gcp/beyondcorp/google_beyondcorp_security_gateway_iam_binding/public_access_prevention/plan.json b/inputs/gcp/beyondcorp/google_beyondcorp_security_gateway_iam_binding/public_access_prevention/plan.json deleted file mode 100644 index bba59ec4f..000000000 Binary files a/inputs/gcp/beyondcorp/google_beyondcorp_security_gateway_iam_binding/public_access_prevention/plan.json and /dev/null differ diff --git a/inputs/gcp/beyondcorp/google_beyondcorp_security_gateway_iam_member/public_access_prevention/plan b/inputs/gcp/beyondcorp/google_beyondcorp_security_gateway_iam_member/public_access_prevention/plan deleted file mode 100644 index a44773685..000000000 Binary files a/inputs/gcp/beyondcorp/google_beyondcorp_security_gateway_iam_member/public_access_prevention/plan and /dev/null differ diff --git a/inputs/gcp/beyondcorp/google_beyondcorp_security_gateway_iam_member/public_access_prevention/plan.json b/inputs/gcp/beyondcorp/google_beyondcorp_security_gateway_iam_member/public_access_prevention/plan.json deleted file mode 100644 index a60661e16..000000000 Binary files a/inputs/gcp/beyondcorp/google_beyondcorp_security_gateway_iam_member/public_access_prevention/plan.json and /dev/null differ diff --git a/inputs/gcp/bigquery_data_transfer/bigquery_data_transfer_config/destination_dataset_id/.terraform.lock.hcl b/inputs/gcp/bigquery_data_transfer/bigquery_data_transfer_config/destination_dataset_id/.terraform.lock.hcl index 276a68ae4..95ea5e6bb 100644 --- a/inputs/gcp/bigquery_data_transfer/bigquery_data_transfer_config/destination_dataset_id/.terraform.lock.hcl +++ b/inputs/gcp/bigquery_data_transfer/bigquery_data_transfer_config/destination_dataset_id/.terraform.lock.hcl @@ -5,6 +5,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "6.49.2" hashes = [ "h1:Q1oDLBM6VLi58o0GuS8gk9pPqiYniQwrypqWSzMVMdI=", + "h1:mQ3VZqZyDmfbfzqU3egFMEiVyk8nv3CNubNBi2xo2Jo=", "zh:04dbba38cc201d8f35f21c65fe5fe022b2ef30712c59d0b04df1182ee484ee29", "zh:37478f37b696e214049a7c1e397a6ebcf6b10e3652a6275c5e99ef972a0cd17f", "zh:3a68292e88e6612ed014e22d53a693859071337fcc49a244936094ae8f2b82d8", diff --git a/inputs/gcp/bigquery_data_transfer/bigquery_data_transfer_config/encryption_configuration/.terraform.lock.hcl b/inputs/gcp/bigquery_data_transfer/bigquery_data_transfer_config/encryption_configuration/.terraform.lock.hcl index 95ae8be90..364833524 100644 --- a/inputs/gcp/bigquery_data_transfer/bigquery_data_transfer_config/encryption_configuration/.terraform.lock.hcl +++ b/inputs/gcp/bigquery_data_transfer/bigquery_data_transfer_config/encryption_configuration/.terraform.lock.hcl @@ -5,6 +5,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "7.0.0" hashes = [ "h1:UGZQpBqvTya6QY0X5mtTXg/nQR0OpIXB1sIgxOZFM44=", + "h1:e1fx1uhoBrL5HG9KS2Vzxk1TDvPF9jjS5S7a87+ih+M=", "zh:006765cfabc014660550c09b75649b7a3795f932d45b1ec900edc83157ccddc3", "zh:3af54215d25f3b77d75251c481e5fb5c229ce2d7ddb308b2999d9a45feb19cf7", "zh:494aab76cf07e94f7d10cbe271f107c2c5fb9ccfef7db595c98bcd2abb52f812", diff --git a/inputs/gcp/bigquery_data_transfer/bigquery_data_transfer_config/location/.terraform.lock.hcl b/inputs/gcp/bigquery_data_transfer/bigquery_data_transfer_config/location/.terraform.lock.hcl index 4366380b4..20da282b5 100644 --- a/inputs/gcp/bigquery_data_transfer/bigquery_data_transfer_config/location/.terraform.lock.hcl +++ b/inputs/gcp/bigquery_data_transfer/bigquery_data_transfer_config/location/.terraform.lock.hcl @@ -5,6 +5,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "6.49.1" hashes = [ "h1:4mkZPor+3lHkvp8AnTX/D1cvBOHppNYpP5k7K5UEoyc=", + "h1:5G/OEkmI8T+P+d2hi+i8zpK4ewi9yaituHAZHAyyuxg=", "zh:0fca29d64bee30984645a9c88076a5e26213b3f54b75a89ae64ca3148ea9fcd9", "zh:2496949c284d0d0982a8d53ac18f5c3d8f52beb0b94109098847944a74f455be", "zh:4ef9a757a13ec3b09779295ae5ee260dd230d430a1b1232152b0cef0f4e8d85d", diff --git a/inputs/gcp/chronicle/chronicle_rule/allowed_location/.terraform.lock.hcl b/inputs/gcp/chronicle/chronicle_rule/allowed_location/.terraform.lock.hcl index f4f5bf859..5698484ba 100644 --- a/inputs/gcp/chronicle/chronicle_rule/allowed_location/.terraform.lock.hcl +++ b/inputs/gcp/chronicle/chronicle_rule/allowed_location/.terraform.lock.hcl @@ -2,20 +2,20 @@ # Manual edits may be lost in future updates. provider "registry.terraform.io/hashicorp/google" { - version = "7.2.0" + version = "7.16.0" hashes = [ - "h1:n9j0rZHrmXEay4dYo0D+RGS7X8eQr+YZ0MupX8GaMfI=", - "zh:0f036e400c90ae45289b948afb49ca938d169fb4a31d7560b345fd0ae5121407", - "zh:28a7c683656178456dc7942f051df46052150cee74da7535e7ca8748a83baf30", - "zh:2994083c634cff44de626b4bfca3e5e8ed5b2a08baa6f4c4fa4b217d5f49559a", - "zh:3c0d98921944c39f2e9d7f42122f44bcf07418ee9ee5faf81e6357cecbac4870", - "zh:4f869f574ab7e5970e9ec543fccd4c773e41a111f9bedc7075b725217f3c6fd2", - "zh:65479468ab9f6735d267bb593af8d139561790467ba6f8f99c3ba3be25b3a8e9", - "zh:827cb00f8dc4bba03afce2ff5d11bcd2d0528fc4624ea05b70354a1fa18b59fb", - "zh:a087e5155bd73d59f9dc6df65c1b38944de06cb2a5ead2439b31ad10a18da5a7", - "zh:db714b0e7a4365b3d93c17df2abc2bc883c89b15524111433af05aea176680c1", - "zh:e5444fde901cfefe7f66c8e9a1d9915d403fc2a6ebe87eaa2a262d2a50ee0a10", - "zh:f360342aa2bad7f6123c959b2129abaed99e26891dcd0b0719fec55252bb44b9", + "h1:o+dOw75zzgpJAUdjEa2a2T62OEThcEr52/4CymRAewA=", + "zh:1cd6f0926e5884998965675d3fbdc5e5abd7335d3f5f83571226be7f50f44443", + "zh:2bc3e3db662df08755af37d23c856f0ec3b8474f629f042ad3af228ff1c3cb5a", + "zh:41869013f786bff8c2ba35e203e84b6c3ec9ff623d6cea6796f5f0204719e907", + "zh:493213e16cb8de6a39b0d6b327faab7909f32ad973fb937d2b3bc4faa07c911a", + "zh:5e9df66ddeef9fcf77acd6185fe880e6b3725b98850ea3b47ef726c44dc04a71", + "zh:6b9e8f83316cf660549a4032342107bb41a7e549eba923f69aefa1ae5ab80a3f", + "zh:6da9316ca7c70d4997c4a62cd534f674e02888e351cb189f7b77b5a03e803773", + "zh:7d1b1dc7c04924dd203e9c5d2041fb732b1e2556b4041c9272a786d37924be7c", + "zh:86dcafef126ad72b592582d8fdb2591d8a2cb45ff85e5f5ff0ac76fbbd7be1bb", + "zh:8a8994c67297336ede3ded9d2558104d49de6fdfa85b88dc99b50030d68158cf", + "zh:a67d8b4774cdb45fb13e73e15885e229561a8b8f46d9f0069b81bf4d3ca03c4a", "zh:f569b65999264a9416862bca5cd2a6177d94ccb0424f3a4ef424428912b9cb3c", ] } diff --git a/inputs/gcp/chronicle/chronicle_rule/allowed_location/plan.json b/inputs/gcp/chronicle/chronicle_rule/allowed_location/plan.json deleted file mode 100644 index ec879eba3..000000000 Binary files a/inputs/gcp/chronicle/chronicle_rule/allowed_location/plan.json and /dev/null differ diff --git a/inputs/gcp/chronicle/chronicle_rule/allowed_scope/plan.json b/inputs/gcp/chronicle/chronicle_rule/allowed_scope/plan.json deleted file mode 100644 index 9a8062a4e..000000000 Binary files a/inputs/gcp/chronicle/chronicle_rule/allowed_scope/plan.json and /dev/null differ diff --git a/inputs/gcp/chronicle/data_access_label/allowed_location/.terraform.lock.hcl b/inputs/gcp/chronicle/data_access_label/allowed_location/.terraform.lock.hcl index f4f5bf859..5698484ba 100644 --- a/inputs/gcp/chronicle/data_access_label/allowed_location/.terraform.lock.hcl +++ b/inputs/gcp/chronicle/data_access_label/allowed_location/.terraform.lock.hcl @@ -2,20 +2,20 @@ # Manual edits may be lost in future updates. provider "registry.terraform.io/hashicorp/google" { - version = "7.2.0" + version = "7.16.0" hashes = [ - "h1:n9j0rZHrmXEay4dYo0D+RGS7X8eQr+YZ0MupX8GaMfI=", - "zh:0f036e400c90ae45289b948afb49ca938d169fb4a31d7560b345fd0ae5121407", - "zh:28a7c683656178456dc7942f051df46052150cee74da7535e7ca8748a83baf30", - "zh:2994083c634cff44de626b4bfca3e5e8ed5b2a08baa6f4c4fa4b217d5f49559a", - "zh:3c0d98921944c39f2e9d7f42122f44bcf07418ee9ee5faf81e6357cecbac4870", - "zh:4f869f574ab7e5970e9ec543fccd4c773e41a111f9bedc7075b725217f3c6fd2", - "zh:65479468ab9f6735d267bb593af8d139561790467ba6f8f99c3ba3be25b3a8e9", - "zh:827cb00f8dc4bba03afce2ff5d11bcd2d0528fc4624ea05b70354a1fa18b59fb", - "zh:a087e5155bd73d59f9dc6df65c1b38944de06cb2a5ead2439b31ad10a18da5a7", - "zh:db714b0e7a4365b3d93c17df2abc2bc883c89b15524111433af05aea176680c1", - "zh:e5444fde901cfefe7f66c8e9a1d9915d403fc2a6ebe87eaa2a262d2a50ee0a10", - "zh:f360342aa2bad7f6123c959b2129abaed99e26891dcd0b0719fec55252bb44b9", + "h1:o+dOw75zzgpJAUdjEa2a2T62OEThcEr52/4CymRAewA=", + "zh:1cd6f0926e5884998965675d3fbdc5e5abd7335d3f5f83571226be7f50f44443", + "zh:2bc3e3db662df08755af37d23c856f0ec3b8474f629f042ad3af228ff1c3cb5a", + "zh:41869013f786bff8c2ba35e203e84b6c3ec9ff623d6cea6796f5f0204719e907", + "zh:493213e16cb8de6a39b0d6b327faab7909f32ad973fb937d2b3bc4faa07c911a", + "zh:5e9df66ddeef9fcf77acd6185fe880e6b3725b98850ea3b47ef726c44dc04a71", + "zh:6b9e8f83316cf660549a4032342107bb41a7e549eba923f69aefa1ae5ab80a3f", + "zh:6da9316ca7c70d4997c4a62cd534f674e02888e351cb189f7b77b5a03e803773", + "zh:7d1b1dc7c04924dd203e9c5d2041fb732b1e2556b4041c9272a786d37924be7c", + "zh:86dcafef126ad72b592582d8fdb2591d8a2cb45ff85e5f5ff0ac76fbbd7be1bb", + "zh:8a8994c67297336ede3ded9d2558104d49de6fdfa85b88dc99b50030d68158cf", + "zh:a67d8b4774cdb45fb13e73e15885e229561a8b8f46d9f0069b81bf4d3ca03c4a", "zh:f569b65999264a9416862bca5cd2a6177d94ccb0424f3a4ef424428912b9cb3c", ] } diff --git a/inputs/gcp/chronicle/data_access_label/allowed_location/plan.json b/inputs/gcp/chronicle/data_access_label/allowed_location/plan.json deleted file mode 100644 index 7d4d3c31d..000000000 Binary files a/inputs/gcp/chronicle/data_access_label/allowed_location/plan.json and /dev/null differ diff --git a/inputs/gcp/chronicle/data_access_label/udm_query/plan.json b/inputs/gcp/chronicle/data_access_label/udm_query/plan.json deleted file mode 100644 index 0419eb1ed..000000000 Binary files a/inputs/gcp/chronicle/data_access_label/udm_query/plan.json and /dev/null differ diff --git a/inputs/gcp/chronicle/data_access_scope/allowed_location/plan.json b/inputs/gcp/chronicle/data_access_scope/allowed_location/plan.json deleted file mode 100644 index 19bec291d..000000000 Binary files a/inputs/gcp/chronicle/data_access_scope/allowed_location/plan.json and /dev/null differ diff --git a/inputs/gcp/chronicle/data_access_scope/secure_data_access_scope_configuration/plan.json b/inputs/gcp/chronicle/data_access_scope/secure_data_access_scope_configuration/plan.json deleted file mode 100644 index 03958d86c..000000000 Binary files a/inputs/gcp/chronicle/data_access_scope/secure_data_access_scope_configuration/plan.json and /dev/null differ diff --git a/inputs/gcp/chronicle/reference_list/allowed_location/plan.json b/inputs/gcp/chronicle/reference_list/allowed_location/plan.json deleted file mode 100644 index b42423c85..000000000 Binary files a/inputs/gcp/chronicle/reference_list/allowed_location/plan.json and /dev/null differ diff --git a/inputs/gcp/chronicle/retrohunt/allowed_location/plan.json b/inputs/gcp/chronicle/retrohunt/allowed_location/plan.json deleted file mode 100644 index 56f1d8c79..000000000 Binary files a/inputs/gcp/chronicle/retrohunt/allowed_location/plan.json and /dev/null differ diff --git a/inputs/gcp/chronicle/rule_deployment/allowed_location/.terraform.lock.hcl b/inputs/gcp/chronicle/rule_deployment/allowed_location/.terraform.lock.hcl index f4f5bf859..5698484ba 100644 --- a/inputs/gcp/chronicle/rule_deployment/allowed_location/.terraform.lock.hcl +++ b/inputs/gcp/chronicle/rule_deployment/allowed_location/.terraform.lock.hcl @@ -2,20 +2,20 @@ # Manual edits may be lost in future updates. provider "registry.terraform.io/hashicorp/google" { - version = "7.2.0" + version = "7.16.0" hashes = [ - "h1:n9j0rZHrmXEay4dYo0D+RGS7X8eQr+YZ0MupX8GaMfI=", - "zh:0f036e400c90ae45289b948afb49ca938d169fb4a31d7560b345fd0ae5121407", - "zh:28a7c683656178456dc7942f051df46052150cee74da7535e7ca8748a83baf30", - "zh:2994083c634cff44de626b4bfca3e5e8ed5b2a08baa6f4c4fa4b217d5f49559a", - "zh:3c0d98921944c39f2e9d7f42122f44bcf07418ee9ee5faf81e6357cecbac4870", - "zh:4f869f574ab7e5970e9ec543fccd4c773e41a111f9bedc7075b725217f3c6fd2", - "zh:65479468ab9f6735d267bb593af8d139561790467ba6f8f99c3ba3be25b3a8e9", - "zh:827cb00f8dc4bba03afce2ff5d11bcd2d0528fc4624ea05b70354a1fa18b59fb", - "zh:a087e5155bd73d59f9dc6df65c1b38944de06cb2a5ead2439b31ad10a18da5a7", - "zh:db714b0e7a4365b3d93c17df2abc2bc883c89b15524111433af05aea176680c1", - "zh:e5444fde901cfefe7f66c8e9a1d9915d403fc2a6ebe87eaa2a262d2a50ee0a10", - "zh:f360342aa2bad7f6123c959b2129abaed99e26891dcd0b0719fec55252bb44b9", + "h1:o+dOw75zzgpJAUdjEa2a2T62OEThcEr52/4CymRAewA=", + "zh:1cd6f0926e5884998965675d3fbdc5e5abd7335d3f5f83571226be7f50f44443", + "zh:2bc3e3db662df08755af37d23c856f0ec3b8474f629f042ad3af228ff1c3cb5a", + "zh:41869013f786bff8c2ba35e203e84b6c3ec9ff623d6cea6796f5f0204719e907", + "zh:493213e16cb8de6a39b0d6b327faab7909f32ad973fb937d2b3bc4faa07c911a", + "zh:5e9df66ddeef9fcf77acd6185fe880e6b3725b98850ea3b47ef726c44dc04a71", + "zh:6b9e8f83316cf660549a4032342107bb41a7e549eba923f69aefa1ae5ab80a3f", + "zh:6da9316ca7c70d4997c4a62cd534f674e02888e351cb189f7b77b5a03e803773", + "zh:7d1b1dc7c04924dd203e9c5d2041fb732b1e2556b4041c9272a786d37924be7c", + "zh:86dcafef126ad72b592582d8fdb2591d8a2cb45ff85e5f5ff0ac76fbbd7be1bb", + "zh:8a8994c67297336ede3ded9d2558104d49de6fdfa85b88dc99b50030d68158cf", + "zh:a67d8b4774cdb45fb13e73e15885e229561a8b8f46d9f0069b81bf4d3ca03c4a", "zh:f569b65999264a9416862bca5cd2a6177d94ccb0424f3a4ef424428912b9cb3c", ] } diff --git a/inputs/gcp/chronicle/rule_deployment/allowed_location/plan.json b/inputs/gcp/chronicle/rule_deployment/allowed_location/plan.json deleted file mode 100644 index 0bc378376..000000000 Binary files a/inputs/gcp/chronicle/rule_deployment/allowed_location/plan.json and /dev/null differ diff --git a/inputs/gcp/chronicle/rule_deployment/detect_alerts/plan.json b/inputs/gcp/chronicle/rule_deployment/detect_alerts/plan.json deleted file mode 100644 index 5de9a5793..000000000 Binary files a/inputs/gcp/chronicle/rule_deployment/detect_alerts/plan.json and /dev/null differ diff --git a/inputs/gcp/chronicle/rule_deployment/rule_deployment_enabled/plan.json b/inputs/gcp/chronicle/rule_deployment/rule_deployment_enabled/plan.json deleted file mode 100644 index d833f88f2..000000000 Binary files a/inputs/gcp/chronicle/rule_deployment/rule_deployment_enabled/plan.json and /dev/null differ diff --git a/inputs/gcp/chronicle/watchlist/allowed_location/plan.json b/inputs/gcp/chronicle/watchlist/allowed_location/plan.json deleted file mode 100644 index 24463d03b..000000000 Binary files a/inputs/gcp/chronicle/watchlist/allowed_location/plan.json and /dev/null differ diff --git a/inputs/gcp/chronicle/watchlist/disallow_manual_entity_population/.terraform.lock.hcl b/inputs/gcp/chronicle/watchlist/disallow_manual_entity_population/.terraform.lock.hcl index 9c414a5f3..5698484ba 100644 --- a/inputs/gcp/chronicle/watchlist/disallow_manual_entity_population/.terraform.lock.hcl +++ b/inputs/gcp/chronicle/watchlist/disallow_manual_entity_population/.terraform.lock.hcl @@ -2,20 +2,20 @@ # Manual edits may be lost in future updates. provider "registry.terraform.io/hashicorp/google" { - version = "7.0.1" + version = "7.16.0" hashes = [ - "h1:tDyiGsjrgnPHdq3AV2C9T17easvo8lT7k9U5w4R+cEU=", - "zh:1409f70a7757de222023d5859b1dbcab8f3bc744a81a4d7c39aac4cf249e16ad", - "zh:24ca670db87d5d075852b0df8fc0d198415b02d465e853d93a18e78b4dc2b8f9", - "zh:52b8139dc3acda118576c2cccd228fd8b85e20e1240b5002c0a8ee96a3ea6e9a", - "zh:59ea80da070ed2bd41361f86deb69c3ffd858f4fa797fff417594a74a01df661", - "zh:72e83d46ff2554282b2cec0532854d96eefb30feb36bcb09a64a30a16b1a0af0", - "zh:77e4f570fd4c82246ffff74a017037894442261ceb0c10d508fe2fd0dfcb44e3", - "zh:7d89312d3d6d07df563c297e0acc077c2eaf40c855d89dcd03872784a71cd627", - "zh:9bfc2947a9a77350ca0a4f221e7957f409effb7ff2375f7937622982c5abde92", - "zh:a026350f3e4f2edcae02faf8f49420e257ac6bd979fa9442e146f3fdc4a9becd", - "zh:a6c160c90f5ef3894ea904000ddf24a752b55bf8eabe5c0ba0d9db70e44a63d3", - "zh:c61eeb9d379e3759236073f91d908cd01f810556278a9db8d8b1864d474f2f78", + "h1:o+dOw75zzgpJAUdjEa2a2T62OEThcEr52/4CymRAewA=", + "zh:1cd6f0926e5884998965675d3fbdc5e5abd7335d3f5f83571226be7f50f44443", + "zh:2bc3e3db662df08755af37d23c856f0ec3b8474f629f042ad3af228ff1c3cb5a", + "zh:41869013f786bff8c2ba35e203e84b6c3ec9ff623d6cea6796f5f0204719e907", + "zh:493213e16cb8de6a39b0d6b327faab7909f32ad973fb937d2b3bc4faa07c911a", + "zh:5e9df66ddeef9fcf77acd6185fe880e6b3725b98850ea3b47ef726c44dc04a71", + "zh:6b9e8f83316cf660549a4032342107bb41a7e549eba923f69aefa1ae5ab80a3f", + "zh:6da9316ca7c70d4997c4a62cd534f674e02888e351cb189f7b77b5a03e803773", + "zh:7d1b1dc7c04924dd203e9c5d2041fb732b1e2556b4041c9272a786d37924be7c", + "zh:86dcafef126ad72b592582d8fdb2591d8a2cb45ff85e5f5ff0ac76fbbd7be1bb", + "zh:8a8994c67297336ede3ded9d2558104d49de6fdfa85b88dc99b50030d68158cf", + "zh:a67d8b4774cdb45fb13e73e15885e229561a8b8f46d9f0069b81bf4d3ca03c4a", "zh:f569b65999264a9416862bca5cd2a6177d94ccb0424f3a4ef424428912b9cb3c", ] } diff --git a/inputs/gcp/chronicle/watchlist/disallow_manual_entity_population/plan.json b/inputs/gcp/chronicle/watchlist/disallow_manual_entity_population/plan.json deleted file mode 100644 index b825eb363..000000000 Binary files a/inputs/gcp/chronicle/watchlist/disallow_manual_entity_population/plan.json and /dev/null differ diff --git a/inputs/gcp/chronicle/watchlist/multiplying_factor/.terraform.lock.hcl b/inputs/gcp/chronicle/watchlist/multiplying_factor/.terraform.lock.hcl index 9c414a5f3..5698484ba 100644 --- a/inputs/gcp/chronicle/watchlist/multiplying_factor/.terraform.lock.hcl +++ b/inputs/gcp/chronicle/watchlist/multiplying_factor/.terraform.lock.hcl @@ -2,20 +2,20 @@ # Manual edits may be lost in future updates. provider "registry.terraform.io/hashicorp/google" { - version = "7.0.1" + version = "7.16.0" hashes = [ - "h1:tDyiGsjrgnPHdq3AV2C9T17easvo8lT7k9U5w4R+cEU=", - "zh:1409f70a7757de222023d5859b1dbcab8f3bc744a81a4d7c39aac4cf249e16ad", - "zh:24ca670db87d5d075852b0df8fc0d198415b02d465e853d93a18e78b4dc2b8f9", - "zh:52b8139dc3acda118576c2cccd228fd8b85e20e1240b5002c0a8ee96a3ea6e9a", - "zh:59ea80da070ed2bd41361f86deb69c3ffd858f4fa797fff417594a74a01df661", - "zh:72e83d46ff2554282b2cec0532854d96eefb30feb36bcb09a64a30a16b1a0af0", - "zh:77e4f570fd4c82246ffff74a017037894442261ceb0c10d508fe2fd0dfcb44e3", - "zh:7d89312d3d6d07df563c297e0acc077c2eaf40c855d89dcd03872784a71cd627", - "zh:9bfc2947a9a77350ca0a4f221e7957f409effb7ff2375f7937622982c5abde92", - "zh:a026350f3e4f2edcae02faf8f49420e257ac6bd979fa9442e146f3fdc4a9becd", - "zh:a6c160c90f5ef3894ea904000ddf24a752b55bf8eabe5c0ba0d9db70e44a63d3", - "zh:c61eeb9d379e3759236073f91d908cd01f810556278a9db8d8b1864d474f2f78", + "h1:o+dOw75zzgpJAUdjEa2a2T62OEThcEr52/4CymRAewA=", + "zh:1cd6f0926e5884998965675d3fbdc5e5abd7335d3f5f83571226be7f50f44443", + "zh:2bc3e3db662df08755af37d23c856f0ec3b8474f629f042ad3af228ff1c3cb5a", + "zh:41869013f786bff8c2ba35e203e84b6c3ec9ff623d6cea6796f5f0204719e907", + "zh:493213e16cb8de6a39b0d6b327faab7909f32ad973fb937d2b3bc4faa07c911a", + "zh:5e9df66ddeef9fcf77acd6185fe880e6b3725b98850ea3b47ef726c44dc04a71", + "zh:6b9e8f83316cf660549a4032342107bb41a7e549eba923f69aefa1ae5ab80a3f", + "zh:6da9316ca7c70d4997c4a62cd534f674e02888e351cb189f7b77b5a03e803773", + "zh:7d1b1dc7c04924dd203e9c5d2041fb732b1e2556b4041c9272a786d37924be7c", + "zh:86dcafef126ad72b592582d8fdb2591d8a2cb45ff85e5f5ff0ac76fbbd7be1bb", + "zh:8a8994c67297336ede3ded9d2558104d49de6fdfa85b88dc99b50030d68158cf", + "zh:a67d8b4774cdb45fb13e73e15885e229561a8b8f46d9f0069b81bf4d3ca03c4a", "zh:f569b65999264a9416862bca5cd2a6177d94ccb0424f3a4ef424428912b9cb3c", ] } diff --git a/inputs/gcp/chronicle/watchlist/multiplying_factor/c.tf b/inputs/gcp/chronicle/watchlist/multiplying_factor/c.tf index 1344e4061..ac9e4c56e 100644 --- a/inputs/gcp/chronicle/watchlist/multiplying_factor/c.tf +++ b/inputs/gcp/chronicle/watchlist/multiplying_factor/c.tf @@ -5,7 +5,7 @@ resource "google_chronicle_watchlist" "c" { watchlist_id = "c" description = "Critical assets" display_name = "Secure Watchlist" - multiplying_factor = 1.5 + multiplying_factor = 1.0 entity_population_mechanism { manual {} diff --git a/inputs/gcp/chronicle/watchlist/multiplying_factor/plan.json b/inputs/gcp/chronicle/watchlist/multiplying_factor/plan.json deleted file mode 100644 index f746fe537..000000000 Binary files a/inputs/gcp/chronicle/watchlist/multiplying_factor/plan.json and /dev/null differ diff --git a/inputs/gcp/cloud_deployment_manager/google_deployment_manager_deployment/create_policy/.terraform.lock.hcl b/inputs/gcp/cloud_deployment_manager/google_deployment_manager_deployment/create_policy/.terraform.lock.hcl index 580a3ecca..d178b60fd 100644 --- a/inputs/gcp/cloud_deployment_manager/google_deployment_manager_deployment/create_policy/.terraform.lock.hcl +++ b/inputs/gcp/cloud_deployment_manager/google_deployment_manager_deployment/create_policy/.terraform.lock.hcl @@ -4,6 +4,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "7.3.0" hashes = [ + "h1:1WxLeVFcyCHXxeujuSS2Alr72zMqDK4IaCQlGiROuD4=", "h1:JnL0n0QEnNGhsZkzGqFb5mqW1dpZnweBftXjRKksPYs=", "zh:135c90b063f15c090ce82d99887032e495bbe6388764b666148ae78a776c4621", "zh:47bb8721c29556b3b42f7c2ed73f8fdfb214609599ba819eebbe9ae33aab0e07", diff --git a/inputs/gcp/cloud_deployment_manager/google_deployment_manager_deployment/delete_policy/.terraform.lock.hcl b/inputs/gcp/cloud_deployment_manager/google_deployment_manager_deployment/delete_policy/.terraform.lock.hcl index b0909a6b6..8fde93177 100644 --- a/inputs/gcp/cloud_deployment_manager/google_deployment_manager_deployment/delete_policy/.terraform.lock.hcl +++ b/inputs/gcp/cloud_deployment_manager/google_deployment_manager_deployment/delete_policy/.terraform.lock.hcl @@ -4,6 +4,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "7.2.0" hashes = [ + "h1:n9j0rZHrmXEay4dYo0D+RGS7X8eQr+YZ0MupX8GaMfI=", "h1:rx4REBgSS0Bs5OQ9wEjR85a/cjKqQXYtgke6l4ORfEs=", "zh:0f036e400c90ae45289b948afb49ca938d169fb4a31d7560b345fd0ae5121407", "zh:28a7c683656178456dc7942f051df46052150cee74da7535e7ca8748a83baf30", diff --git a/inputs/gcp/cloud_deployment_manager/google_deployment_manager_deployment/preview/.terraform.lock.hcl b/inputs/gcp/cloud_deployment_manager/google_deployment_manager_deployment/preview/.terraform.lock.hcl index b0909a6b6..8fde93177 100644 --- a/inputs/gcp/cloud_deployment_manager/google_deployment_manager_deployment/preview/.terraform.lock.hcl +++ b/inputs/gcp/cloud_deployment_manager/google_deployment_manager_deployment/preview/.terraform.lock.hcl @@ -4,6 +4,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "7.2.0" hashes = [ + "h1:n9j0rZHrmXEay4dYo0D+RGS7X8eQr+YZ0MupX8GaMfI=", "h1:rx4REBgSS0Bs5OQ9wEjR85a/cjKqQXYtgke6l4ORfEs=", "zh:0f036e400c90ae45289b948afb49ca938d169fb4a31d7560b345fd0ae5121407", "zh:28a7c683656178456dc7942f051df46052150cee74da7535e7ca8748a83baf30", diff --git a/inputs/gcp/cloud_platform_service/google_folder/deletion_protection/plan.json b/inputs/gcp/cloud_platform_service/google_folder/deletion_protection/plan.json new file mode 100644 index 000000000..bd74426cb --- /dev/null +++ b/inputs/gcp/cloud_platform_service/google_folder/deletion_protection/plan.json @@ -0,0 +1 @@ +{"format_version":"1.2","terraform_version":"1.13.3","planned_values":{"root_module":{"resources":[{"address":"google_folder.C1","mode":"managed","type":"google_folder","name":"C1","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"deletion_protection":true,"display_name":"Compliant Folder","parent":"organizations/1234567","tags":null,"timeouts":null},"sensitive_values":{"configured_capabilities":[]}},{"address":"google_folder.C2","mode":"managed","type":"google_folder","name":"C2","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"deletion_protection":true,"display_name":"Department A Folder","parent":"DepartmentA/1234567","tags":null,"timeouts":null},"sensitive_values":{"configured_capabilities":[]}},{"address":"google_folder.NC1","mode":"managed","type":"google_folder","name":"NC1","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"deletion_protection":false,"display_name":"NonCompliant Folder","parent":"organizations/1234567","tags":null,"timeouts":null},"sensitive_values":{"configured_capabilities":[]}},{"address":"google_folder.NC2","mode":"managed","type":"google_folder","name":"NC2","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"deletion_protection":false,"display_name":"Department B Folder","parent":"DepartmentB/1234567","tags":null,"timeouts":null},"sensitive_values":{"configured_capabilities":[]}}]}},"resource_changes":[{"address":"google_folder.C1","mode":"managed","type":"google_folder","name":"C1","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"deletion_protection":true,"display_name":"Compliant Folder","parent":"organizations/1234567","tags":null,"timeouts":null},"after_unknown":{"configured_capabilities":true,"create_time":true,"folder_id":true,"id":true,"lifecycle_state":true,"management_project":true,"name":true},"before_sensitive":false,"after_sensitive":{"configured_capabilities":[]}}},{"address":"google_folder.C2","mode":"managed","type":"google_folder","name":"C2","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"deletion_protection":true,"display_name":"Department A Folder","parent":"DepartmentA/1234567","tags":null,"timeouts":null},"after_unknown":{"configured_capabilities":true,"create_time":true,"folder_id":true,"id":true,"lifecycle_state":true,"management_project":true,"name":true},"before_sensitive":false,"after_sensitive":{"configured_capabilities":[]}}},{"address":"google_folder.NC1","mode":"managed","type":"google_folder","name":"NC1","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"deletion_protection":false,"display_name":"NonCompliant Folder","parent":"organizations/1234567","tags":null,"timeouts":null},"after_unknown":{"configured_capabilities":true,"create_time":true,"folder_id":true,"id":true,"lifecycle_state":true,"management_project":true,"name":true},"before_sensitive":false,"after_sensitive":{"configured_capabilities":[]}}},{"address":"google_folder.NC2","mode":"managed","type":"google_folder","name":"NC2","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"deletion_protection":false,"display_name":"Department B Folder","parent":"DepartmentB/1234567","tags":null,"timeouts":null},"after_unknown":{"configured_capabilities":true,"create_time":true,"folder_id":true,"id":true,"lifecycle_state":true,"management_project":true,"name":true},"before_sensitive":false,"after_sensitive":{"configured_capabilities":[]}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_folder.C1","mode":"managed","type":"google_folder","name":"C1","provider_config_key":"google","expressions":{"deletion_protection":{"constant_value":true},"display_name":{"constant_value":"Compliant Folder"},"parent":{"constant_value":"organizations/1234567"}},"schema_version":0},{"address":"google_folder.C2","mode":"managed","type":"google_folder","name":"C2","provider_config_key":"google","expressions":{"deletion_protection":{"constant_value":true},"display_name":{"constant_value":"Department A Folder"},"parent":{"constant_value":"DepartmentA/1234567"}},"schema_version":0},{"address":"google_folder.NC1","mode":"managed","type":"google_folder","name":"NC1","provider_config_key":"google","expressions":{"deletion_protection":{"constant_value":false},"display_name":{"constant_value":"NonCompliant Folder"},"parent":{"constant_value":"organizations/1234567"}},"schema_version":0},{"address":"google_folder.NC2","mode":"managed","type":"google_folder","name":"NC2","provider_config_key":"google","expressions":{"deletion_protection":{"constant_value":false},"display_name":{"constant_value":"Department B Folder"},"parent":{"constant_value":"DepartmentB/1234567"}},"schema_version":0}]}},"timestamp":"2026-02-11T08:59:30Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/cloud_platform_service/google_folder_iam_audit_config/audit_config/plan.json b/inputs/gcp/cloud_platform_service/google_folder_iam_audit_config/audit_config/plan.json new file mode 100644 index 000000000..34b1ea2cf --- /dev/null +++ b/inputs/gcp/cloud_platform_service/google_folder_iam_audit_config/audit_config/plan.json @@ -0,0 +1 @@ +{"format_version":"1.2","terraform_version":"1.13.3","planned_values":{"root_module":{"resources":[{"address":"google_folder_iam_audit_config.c","mode":"managed","type":"google_folder_iam_audit_config","name":"c","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"audit_log_config":[{"exempted_members":[],"log_type":"ADMIN_READ"},{"exempted_members":[],"log_type":"DATA_READ"},{"exempted_members":[],"log_type":"DATA_WRITE"}],"folder":"folders/1234567","service":"allServices"},"sensitive_values":{"audit_log_config":[{"exempted_members":[]},{"exempted_members":[]},{"exempted_members":[]}]}},{"address":"google_folder_iam_audit_config.nc1","mode":"managed","type":"google_folder_iam_audit_config","name":"nc1","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"audit_log_config":[{"exempted_members":["user:admin@example.com"],"log_type":"ADMIN_READ"}],"folder":"folders-A/09876","service":"allServices"},"sensitive_values":{"audit_log_config":[{"exempted_members":[false]}]}},{"address":"google_folder_iam_audit_config.nc2","mode":"managed","type":"google_folder_iam_audit_config","name":"nc2","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"audit_log_config":[{"exempted_members":[],"log_type":"DATA_READ"}],"folder":"folders-B/87772","service":"allServices"},"sensitive_values":{"audit_log_config":[{"exempted_members":[]}]}}]}},"resource_changes":[{"address":"google_folder_iam_audit_config.c","mode":"managed","type":"google_folder_iam_audit_config","name":"c","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"audit_log_config":[{"exempted_members":[],"log_type":"ADMIN_READ"},{"exempted_members":[],"log_type":"DATA_READ"},{"exempted_members":[],"log_type":"DATA_WRITE"}],"folder":"folders/1234567","service":"allServices"},"after_unknown":{"audit_log_config":[{"exempted_members":[]},{"exempted_members":[]},{"exempted_members":[]}],"etag":true,"id":true},"before_sensitive":false,"after_sensitive":{"audit_log_config":[{"exempted_members":[]},{"exempted_members":[]},{"exempted_members":[]}]}}},{"address":"google_folder_iam_audit_config.nc1","mode":"managed","type":"google_folder_iam_audit_config","name":"nc1","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"audit_log_config":[{"exempted_members":["user:admin@example.com"],"log_type":"ADMIN_READ"}],"folder":"folders-A/09876","service":"allServices"},"after_unknown":{"audit_log_config":[{"exempted_members":[false]}],"etag":true,"id":true},"before_sensitive":false,"after_sensitive":{"audit_log_config":[{"exempted_members":[false]}]}}},{"address":"google_folder_iam_audit_config.nc2","mode":"managed","type":"google_folder_iam_audit_config","name":"nc2","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"audit_log_config":[{"exempted_members":[],"log_type":"DATA_READ"}],"folder":"folders-B/87772","service":"allServices"},"after_unknown":{"audit_log_config":[{"exempted_members":[]}],"etag":true,"id":true},"before_sensitive":false,"after_sensitive":{"audit_log_config":[{"exempted_members":[]}]}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_folder_iam_audit_config.c","mode":"managed","type":"google_folder_iam_audit_config","name":"c","provider_config_key":"google","expressions":{"audit_log_config":[{"log_type":{"constant_value":"ADMIN_READ"}},{"log_type":{"constant_value":"DATA_READ"}},{"log_type":{"constant_value":"DATA_WRITE"}}],"folder":{"constant_value":"folders/1234567"},"service":{"constant_value":"allServices"}},"schema_version":0},{"address":"google_folder_iam_audit_config.nc1","mode":"managed","type":"google_folder_iam_audit_config","name":"nc1","provider_config_key":"google","expressions":{"audit_log_config":[{"exempted_members":{"constant_value":["user:admin@example.com"]},"log_type":{"constant_value":"ADMIN_READ"}}],"folder":{"constant_value":"folders-A/09876"},"service":{"constant_value":"allServices"}},"schema_version":0},{"address":"google_folder_iam_audit_config.nc2","mode":"managed","type":"google_folder_iam_audit_config","name":"nc2","provider_config_key":"google","expressions":{"audit_log_config":[{"exempted_members":{"constant_value":[]},"log_type":{"constant_value":"DATA_READ"}}],"folder":{"constant_value":"folders-B/87772"},"service":{"constant_value":"allServices"}},"schema_version":0}]}},"timestamp":"2026-02-11T08:59:30Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/cloud_platform_service/google_folder_iam_binding/iam_binding/plan.json b/inputs/gcp/cloud_platform_service/google_folder_iam_binding/iam_binding/plan.json new file mode 100644 index 000000000..03bdefce9 --- /dev/null +++ b/inputs/gcp/cloud_platform_service/google_folder_iam_binding/iam_binding/plan.json @@ -0,0 +1 @@ +{"format_version":"1.2","terraform_version":"1.13.3","planned_values":{"root_module":{"resources":[{"address":"google_folder_iam_binding.C1","mode":"managed","type":"google_folder_iam_binding","name":"C1","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"condition":[],"folder":"folders/1234567","members":["user:jane@example.com"],"role":"roles/viewer"},"sensitive_values":{"condition":[],"members":[false]}},{"address":"google_folder_iam_binding.NC1","mode":"managed","type":"google_folder_iam_binding","name":"NC1","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"condition":[],"folder":"folders/1234567","members":["user:bob@example.com"],"role":"roles/owner"},"sensitive_values":{"condition":[],"members":[false]}}]}},"resource_changes":[{"address":"google_folder_iam_binding.C1","mode":"managed","type":"google_folder_iam_binding","name":"C1","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"condition":[],"folder":"folders/1234567","members":["user:jane@example.com"],"role":"roles/viewer"},"after_unknown":{"condition":[],"etag":true,"id":true,"members":[false]},"before_sensitive":false,"after_sensitive":{"condition":[],"members":[false]}}},{"address":"google_folder_iam_binding.NC1","mode":"managed","type":"google_folder_iam_binding","name":"NC1","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"condition":[],"folder":"folders/1234567","members":["user:bob@example.com"],"role":"roles/owner"},"after_unknown":{"condition":[],"etag":true,"id":true,"members":[false]},"before_sensitive":false,"after_sensitive":{"condition":[],"members":[false]}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_folder_iam_binding.C1","mode":"managed","type":"google_folder_iam_binding","name":"C1","provider_config_key":"google","expressions":{"folder":{"constant_value":"folders/1234567"},"members":{"constant_value":["user:jane@example.com"]},"role":{"constant_value":"roles/viewer"}},"schema_version":0},{"address":"google_folder_iam_binding.NC1","mode":"managed","type":"google_folder_iam_binding","name":"NC1","provider_config_key":"google","expressions":{"folder":{"constant_value":"folders/1234567"},"members":{"constant_value":["user:bob@example.com"]},"role":{"constant_value":"roles/owner"}},"schema_version":0}]}},"timestamp":"2026-02-11T08:59:30Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/cloud_platform_service/google_folder_iam_member/iam_member/plan.json b/inputs/gcp/cloud_platform_service/google_folder_iam_member/iam_member/plan.json new file mode 100644 index 000000000..7901f0ae2 --- /dev/null +++ b/inputs/gcp/cloud_platform_service/google_folder_iam_member/iam_member/plan.json @@ -0,0 +1 @@ +{"format_version":"1.2","terraform_version":"1.13.3","planned_values":{"root_module":{"resources":[{"address":"google_folder_iam_member.C3","mode":"managed","type":"google_folder_iam_member","name":"C3","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"condition":[],"folder":"folders/1234567","member":"user:jane@example.com","role":"roles/viewer"},"sensitive_values":{"condition":[]}},{"address":"google_folder_iam_member.NC1","mode":"managed","type":"google_folder_iam_member","name":"NC1","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"condition":[],"folder":"folders/1234567","member":"user:bob@example.com","role":"roles/editor"},"sensitive_values":{"condition":[]}},{"address":"google_folder_iam_member.NC2","mode":"managed","type":"google_folder_iam_member","name":"NC2","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"condition":[],"folder":"folders/1234567","member":"user:jessica@example.com","role":"roles/owner"},"sensitive_values":{"condition":[]}}]}},"resource_changes":[{"address":"google_folder_iam_member.C3","mode":"managed","type":"google_folder_iam_member","name":"C3","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"condition":[],"folder":"folders/1234567","member":"user:jane@example.com","role":"roles/viewer"},"after_unknown":{"condition":[],"etag":true,"id":true},"before_sensitive":false,"after_sensitive":{"condition":[]}}},{"address":"google_folder_iam_member.NC1","mode":"managed","type":"google_folder_iam_member","name":"NC1","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"condition":[],"folder":"folders/1234567","member":"user:bob@example.com","role":"roles/editor"},"after_unknown":{"condition":[],"etag":true,"id":true},"before_sensitive":false,"after_sensitive":{"condition":[]}}},{"address":"google_folder_iam_member.NC2","mode":"managed","type":"google_folder_iam_member","name":"NC2","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"condition":[],"folder":"folders/1234567","member":"user:jessica@example.com","role":"roles/owner"},"after_unknown":{"condition":[],"etag":true,"id":true},"before_sensitive":false,"after_sensitive":{"condition":[]}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_folder_iam_member.C3","mode":"managed","type":"google_folder_iam_member","name":"C3","provider_config_key":"google","expressions":{"folder":{"constant_value":"folders/1234567"},"member":{"constant_value":"user:jane@example.com"},"role":{"constant_value":"roles/viewer"}},"schema_version":0},{"address":"google_folder_iam_member.NC1","mode":"managed","type":"google_folder_iam_member","name":"NC1","provider_config_key":"google","expressions":{"folder":{"constant_value":"folders/1234567"},"member":{"constant_value":"user:bob@example.com"},"role":{"constant_value":"roles/editor"}},"schema_version":0},{"address":"google_folder_iam_member.NC2","mode":"managed","type":"google_folder_iam_member","name":"NC2","provider_config_key":"google","expressions":{"folder":{"constant_value":"folders/1234567"},"member":{"constant_value":"user:jessica@example.com"},"role":{"constant_value":"roles/owner"}},"schema_version":0}]}},"timestamp":"2026-02-11T08:59:30Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/cloud_platform_service/google_folder_iam_policy/policy_data/plan.json b/inputs/gcp/cloud_platform_service/google_folder_iam_policy/policy_data/plan.json new file mode 100644 index 000000000..daa1f46fe --- /dev/null +++ b/inputs/gcp/cloud_platform_service/google_folder_iam_policy/policy_data/plan.json @@ -0,0 +1 @@ +{"format_version":"1.2","terraform_version":"1.13.3","planned_values":{"root_module":{"resources":[{"address":"google_folder_iam_policy.C1","mode":"managed","type":"google_folder_iam_policy","name":"C1","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"folder":"folders/1234567","policy_data":"{\"bindings\":[{\"members\":[\"user:jane@example.com\"],\"role\":\"roles/viewer\"}]}"},"sensitive_values":{}},{"address":"google_folder_iam_policy.NC1","mode":"managed","type":"google_folder_iam_policy","name":"NC1","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"folder":"bad-folders/98098","policy_data":"{\"bindings\":[{\"members\":[\"user:bob@example.com\"],\"role\":\"roles/owner\"}]}"},"sensitive_values":{}}]}},"resource_changes":[{"address":"google_folder_iam_policy.C1","mode":"managed","type":"google_folder_iam_policy","name":"C1","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"folder":"folders/1234567","policy_data":"{\"bindings\":[{\"members\":[\"user:jane@example.com\"],\"role\":\"roles/viewer\"}]}"},"after_unknown":{"etag":true,"id":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"google_folder_iam_policy.NC1","mode":"managed","type":"google_folder_iam_policy","name":"NC1","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"folder":"bad-folders/98098","policy_data":"{\"bindings\":[{\"members\":[\"user:bob@example.com\"],\"role\":\"roles/owner\"}]}"},"after_unknown":{"etag":true,"id":true},"before_sensitive":false,"after_sensitive":{}}}],"prior_state":{"format_version":"1.0","terraform_version":"1.13.3","values":{"root_module":{"resources":[{"address":"data.google_iam_policy.c1","mode":"data","type":"google_iam_policy","name":"c1","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"audit_config":null,"binding":[{"condition":[],"members":["user:jane@example.com"],"role":"roles/viewer"}],"id":"3100207545","policy_data":"{\"bindings\":[{\"members\":[\"user:jane@example.com\"],\"role\":\"roles/viewer\"}]}"},"sensitive_values":{"binding":[{"condition":[],"members":[false]}]}},{"address":"data.google_iam_policy.nc1","mode":"data","type":"google_iam_policy","name":"nc1","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"audit_config":null,"binding":[{"condition":[],"members":["user:bob@example.com"],"role":"roles/owner"}],"id":"2551913168","policy_data":"{\"bindings\":[{\"members\":[\"user:bob@example.com\"],\"role\":\"roles/owner\"}]}"},"sensitive_values":{"binding":[{"condition":[],"members":[false]}]}}]}}},"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_folder_iam_policy.C1","mode":"managed","type":"google_folder_iam_policy","name":"C1","provider_config_key":"google","expressions":{"folder":{"constant_value":"folders/1234567"},"policy_data":{"references":["data.google_iam_policy.c1.policy_data","data.google_iam_policy.c1"]}},"schema_version":0},{"address":"google_folder_iam_policy.NC1","mode":"managed","type":"google_folder_iam_policy","name":"NC1","provider_config_key":"google","expressions":{"folder":{"constant_value":"bad-folders/98098"},"policy_data":{"references":["data.google_iam_policy.nc1.policy_data","data.google_iam_policy.nc1"]}},"schema_version":0},{"address":"data.google_iam_policy.c1","mode":"data","type":"google_iam_policy","name":"c1","provider_config_key":"google","expressions":{"binding":[{"members":{"constant_value":["user:jane@example.com"]},"role":{"constant_value":"roles/viewer"}}]},"schema_version":0},{"address":"data.google_iam_policy.nc1","mode":"data","type":"google_iam_policy","name":"nc1","provider_config_key":"google","expressions":{"binding":[{"members":{"constant_value":["user:bob@example.com"]},"role":{"constant_value":"roles/owner"}}]},"schema_version":0}]}},"relevant_attributes":[{"resource":"data.google_iam_policy.c1","attribute":["policy_data"]},{"resource":"data.google_iam_policy.nc1","attribute":["policy_data"]}],"timestamp":"2026-02-11T08:59:34Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/cloud_platform_service/google_folder_organization_policy/constraint/plan.json b/inputs/gcp/cloud_platform_service/google_folder_organization_policy/constraint/plan.json new file mode 100644 index 000000000..3a52a7c25 --- /dev/null +++ b/inputs/gcp/cloud_platform_service/google_folder_organization_policy/constraint/plan.json @@ -0,0 +1 @@ +{"format_version":"1.2","terraform_version":"1.13.3","planned_values":{"root_module":{"resources":[{"address":"google_folder_organization_policy.c1","mode":"managed","type":"google_folder_organization_policy","name":"c1","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"boolean_policy":[{"enforced":true}],"constraint":"compute.disableSerialPortAccess","folder":"folders/123456789","list_policy":[],"restore_policy":[],"timeouts":null},"sensitive_values":{"boolean_policy":[{}],"list_policy":[],"restore_policy":[]}},{"address":"google_folder_organization_policy.c2","mode":"managed","type":"google_folder_organization_policy","name":"c2","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"boolean_policy":[],"constraint":"serviceuser.services","folder":"folders/123456789","list_policy":[{"allow":[{"all":true,"values":null}],"deny":[],"inherit_from_parent":null}],"restore_policy":[],"timeouts":null},"sensitive_values":{"boolean_policy":[],"list_policy":[{"allow":[{}],"deny":[]}],"restore_policy":[]}},{"address":"google_folder_organization_policy.c3","mode":"managed","type":"google_folder_organization_policy","name":"c3","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"boolean_policy":[],"constraint":"serviceuser.services","folder":"folders/123456789","list_policy":[],"restore_policy":[{"default":false}],"timeouts":null},"sensitive_values":{"boolean_policy":[],"list_policy":[],"restore_policy":[{}]}},{"address":"google_folder_organization_policy.nc1","mode":"managed","type":"google_folder_organization_policy","name":"nc1","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"boolean_policy":[],"constraint":"serviceuser.services","folder":"folders/098765432","list_policy":[{"allow":[],"deny":[{"all":false,"values":["cloudresourcemanager.googleapis.com"]}],"inherit_from_parent":null}],"restore_policy":[],"timeouts":null},"sensitive_values":{"boolean_policy":[],"list_policy":[{"allow":[],"deny":[{"values":[false]}]}],"restore_policy":[]}},{"address":"google_folder_organization_policy.nc2","mode":"managed","type":"google_folder_organization_policy","name":"nc2","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"boolean_policy":[],"constraint":"serviceuser.services","folder":"folders/123456789","list_policy":[],"restore_policy":[{"default":true}],"timeouts":null},"sensitive_values":{"boolean_policy":[],"list_policy":[],"restore_policy":[{}]}},{"address":"google_folder_organization_policy.nc3","mode":"managed","type":"google_folder_organization_policy","name":"nc3","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"boolean_policy":[],"constraint":"serviceuser.services","folder":"folders/8383838","list_policy":[{"allow":[{"all":true,"values":null}],"deny":[],"inherit_from_parent":true}],"restore_policy":[],"timeouts":null},"sensitive_values":{"boolean_policy":[],"list_policy":[{"allow":[{}],"deny":[]}],"restore_policy":[]}}]}},"resource_changes":[{"address":"google_folder_organization_policy.c1","mode":"managed","type":"google_folder_organization_policy","name":"c1","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"boolean_policy":[{"enforced":true}],"constraint":"compute.disableSerialPortAccess","folder":"folders/123456789","list_policy":[],"restore_policy":[],"timeouts":null},"after_unknown":{"boolean_policy":[{}],"etag":true,"id":true,"list_policy":[],"restore_policy":[],"update_time":true,"version":true},"before_sensitive":false,"after_sensitive":{"boolean_policy":[{}],"list_policy":[],"restore_policy":[]}}},{"address":"google_folder_organization_policy.c2","mode":"managed","type":"google_folder_organization_policy","name":"c2","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"boolean_policy":[],"constraint":"serviceuser.services","folder":"folders/123456789","list_policy":[{"allow":[{"all":true,"values":null}],"deny":[],"inherit_from_parent":null}],"restore_policy":[],"timeouts":null},"after_unknown":{"boolean_policy":[],"etag":true,"id":true,"list_policy":[{"allow":[{}],"deny":[],"suggested_value":true}],"restore_policy":[],"update_time":true,"version":true},"before_sensitive":false,"after_sensitive":{"boolean_policy":[],"list_policy":[{"allow":[{}],"deny":[]}],"restore_policy":[]}}},{"address":"google_folder_organization_policy.c3","mode":"managed","type":"google_folder_organization_policy","name":"c3","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"boolean_policy":[],"constraint":"serviceuser.services","folder":"folders/123456789","list_policy":[],"restore_policy":[{"default":false}],"timeouts":null},"after_unknown":{"boolean_policy":[],"etag":true,"id":true,"list_policy":[],"restore_policy":[{}],"update_time":true,"version":true},"before_sensitive":false,"after_sensitive":{"boolean_policy":[],"list_policy":[],"restore_policy":[{}]}}},{"address":"google_folder_organization_policy.nc1","mode":"managed","type":"google_folder_organization_policy","name":"nc1","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"boolean_policy":[],"constraint":"serviceuser.services","folder":"folders/098765432","list_policy":[{"allow":[],"deny":[{"all":false,"values":["cloudresourcemanager.googleapis.com"]}],"inherit_from_parent":null}],"restore_policy":[],"timeouts":null},"after_unknown":{"boolean_policy":[],"etag":true,"id":true,"list_policy":[{"allow":[],"deny":[{"values":[false]}],"suggested_value":true}],"restore_policy":[],"update_time":true,"version":true},"before_sensitive":false,"after_sensitive":{"boolean_policy":[],"list_policy":[{"allow":[],"deny":[{"values":[false]}]}],"restore_policy":[]}}},{"address":"google_folder_organization_policy.nc2","mode":"managed","type":"google_folder_organization_policy","name":"nc2","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"boolean_policy":[],"constraint":"serviceuser.services","folder":"folders/123456789","list_policy":[],"restore_policy":[{"default":true}],"timeouts":null},"after_unknown":{"boolean_policy":[],"etag":true,"id":true,"list_policy":[],"restore_policy":[{}],"update_time":true,"version":true},"before_sensitive":false,"after_sensitive":{"boolean_policy":[],"list_policy":[],"restore_policy":[{}]}}},{"address":"google_folder_organization_policy.nc3","mode":"managed","type":"google_folder_organization_policy","name":"nc3","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"boolean_policy":[],"constraint":"serviceuser.services","folder":"folders/8383838","list_policy":[{"allow":[{"all":true,"values":null}],"deny":[],"inherit_from_parent":true}],"restore_policy":[],"timeouts":null},"after_unknown":{"boolean_policy":[],"etag":true,"id":true,"list_policy":[{"allow":[{}],"deny":[],"suggested_value":true}],"restore_policy":[],"update_time":true,"version":true},"before_sensitive":false,"after_sensitive":{"boolean_policy":[],"list_policy":[{"allow":[{}],"deny":[]}],"restore_policy":[]}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_folder_organization_policy.c1","mode":"managed","type":"google_folder_organization_policy","name":"c1","provider_config_key":"google","expressions":{"boolean_policy":[{"enforced":{"constant_value":true}}],"constraint":{"constant_value":"compute.disableSerialPortAccess"},"folder":{"constant_value":"folders/123456789"}},"schema_version":0},{"address":"google_folder_organization_policy.c2","mode":"managed","type":"google_folder_organization_policy","name":"c2","provider_config_key":"google","expressions":{"constraint":{"constant_value":"serviceuser.services"},"folder":{"constant_value":"folders/123456789"},"list_policy":[{"allow":[{"all":{"constant_value":true}}]}]},"schema_version":0},{"address":"google_folder_organization_policy.c3","mode":"managed","type":"google_folder_organization_policy","name":"c3","provider_config_key":"google","expressions":{"constraint":{"constant_value":"serviceuser.services"},"folder":{"constant_value":"folders/123456789"},"restore_policy":[{"default":{"constant_value":false}}]},"schema_version":0},{"address":"google_folder_organization_policy.nc1","mode":"managed","type":"google_folder_organization_policy","name":"nc1","provider_config_key":"google","expressions":{"constraint":{"constant_value":"serviceuser.services"},"folder":{"constant_value":"folders/098765432"},"list_policy":[{"deny":[{"values":{"constant_value":["cloudresourcemanager.googleapis.com"]}}]}]},"schema_version":0},{"address":"google_folder_organization_policy.nc2","mode":"managed","type":"google_folder_organization_policy","name":"nc2","provider_config_key":"google","expressions":{"constraint":{"constant_value":"serviceuser.services"},"folder":{"constant_value":"folders/123456789"},"restore_policy":[{"default":{"constant_value":true}}]},"schema_version":0},{"address":"google_folder_organization_policy.nc3","mode":"managed","type":"google_folder_organization_policy","name":"nc3","provider_config_key":"google","expressions":{"constraint":{"constant_value":"serviceuser.services"},"folder":{"constant_value":"folders/8383838"},"list_policy":[{"allow":[{"all":{"constant_value":true}}],"inherit_from_parent":{"constant_value":true}}]},"schema_version":0}]}},"timestamp":"2026-02-11T08:59:34Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/cloud_platform_service/google_organization_iam_custom_role/stage/plan.json b/inputs/gcp/cloud_platform_service/google_organization_iam_custom_role/stage/plan.json new file mode 100644 index 000000000..4d8051ce7 --- /dev/null +++ b/inputs/gcp/cloud_platform_service/google_organization_iam_custom_role/stage/plan.json @@ -0,0 +1 @@ +{"format_version":"1.2","terraform_version":"1.13.3","planned_values":{"root_module":{"resources":[{"address":"google_organization_iam_custom_role.C1","mode":"managed","type":"google_organization_iam_custom_role","name":"C1","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"description":"Minimal safe permissions","org_id":"123456789","permissions":["iam.roles.list"],"role_id":"myCustomRole","stage":"GA","title":"Read Only Role"},"sensitive_values":{"permissions":[false]}},{"address":"google_organization_iam_custom_role.NC1","mode":"managed","type":"google_organization_iam_custom_role","name":"NC1","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"description":"Grants too much power","org_id":"123456789","permissions":["iam.roles.delete","resourcemanager.*"],"role_id":"badCustomRole","stage":null,"title":"Over-Privileged Role"},"sensitive_values":{"permissions":[false,false]}}]}},"resource_changes":[{"address":"google_organization_iam_custom_role.C1","mode":"managed","type":"google_organization_iam_custom_role","name":"C1","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"description":"Minimal safe permissions","org_id":"123456789","permissions":["iam.roles.list"],"role_id":"myCustomRole","stage":"GA","title":"Read Only Role"},"after_unknown":{"deleted":true,"id":true,"name":true,"permissions":[false]},"before_sensitive":false,"after_sensitive":{"permissions":[false]}}},{"address":"google_organization_iam_custom_role.NC1","mode":"managed","type":"google_organization_iam_custom_role","name":"NC1","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"description":"Grants too much power","org_id":"123456789","permissions":["iam.roles.delete","resourcemanager.*"],"role_id":"badCustomRole","stage":null,"title":"Over-Privileged Role"},"after_unknown":{"deleted":true,"id":true,"name":true,"permissions":[false,false]},"before_sensitive":false,"after_sensitive":{"permissions":[false,false]}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_organization_iam_custom_role.C1","mode":"managed","type":"google_organization_iam_custom_role","name":"C1","provider_config_key":"google","expressions":{"description":{"constant_value":"Minimal safe permissions"},"org_id":{"constant_value":"123456789"},"permissions":{"constant_value":["iam.roles.list"]},"role_id":{"constant_value":"myCustomRole"},"stage":{"constant_value":"GA"},"title":{"constant_value":"Read Only Role"}},"schema_version":0},{"address":"google_organization_iam_custom_role.NC1","mode":"managed","type":"google_organization_iam_custom_role","name":"NC1","provider_config_key":"google","expressions":{"description":{"constant_value":"Grants too much power"},"org_id":{"constant_value":"123456789"},"permissions":{"constant_value":["iam.roles.delete","resourcemanager.*"]},"role_id":{"constant_value":"badCustomRole"},"stage":{"constant_value":"ALPHA"},"title":{"constant_value":"Over-Privileged Role"}},"schema_version":0}]}},"timestamp":"2026-02-11T08:59:34Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/cloud_platform_service/google_project/auto_create_network/.terraform.lock.hcl b/inputs/gcp/cloud_platform_service/google_project/auto_create_network/.terraform.lock.hcl index 6c2d3da9f..2d35c134a 100644 --- a/inputs/gcp/cloud_platform_service/google_project/auto_create_network/.terraform.lock.hcl +++ b/inputs/gcp/cloud_platform_service/google_project/auto_create_network/.terraform.lock.hcl @@ -2,20 +2,20 @@ # Manual edits may be lost in future updates. provider "registry.terraform.io/hashicorp/google" { - version = "7.1.1" + version = "7.19.0" hashes = [ - "h1:Hu/Gy8dB7TXsUyswqm6XJhr7esYmXk9Ea/Jo9VgT4LE=", - "zh:03ee9fdc0d157a606aba68658de6dc809fc3335cccb7c537373d8643412c1327", - "zh:110e8ffe81deb8c203ecf310a15c2dedca1dfc936473a247b8a4f98adebd86f5", - "zh:459e3419c004e7a475fb60cc52d47a34b3dc4e4de905eaa8e8f78ddbe550a9b5", - "zh:466cd31cee36877bc18aeabed80d1f4a22bac4e59a460be6e8bdb72dedca0e2b", - "zh:51d707eb2d854fa16dcbe21e29b01534eb893a2152a219ea84a15bbd87a4ff64", - "zh:69d6a1c83ffddd7f81273a98fb0ff7c13985a3c876565dd3df76c730c9929871", - "zh:9b5050da221735c7e8f75ed00d25578afaf8ed94a8c2f1f58f471eee98105d10", - "zh:ab01f2fd961ee86d99a55186093620d29f5323c0cd5613284d484e333679d70b", - "zh:d0f5b15774b15991baf71eb4a55a6831e3fb4b603f589f80b03393b46a9657a4", - "zh:dc198ec4b42435321f4fa12ca8d713cd350ff2f82d8749b87785b91b15b7c3ed", - "zh:e949c00ce89c92b7ed16cc0b0aed8e80d6416b240dc02047f9fa1de49aa4c44e", + "h1:8lfoMp5YTC0pDT5da1fOJNnEaCm8JWClTo51g9ceipE=", + "zh:06da157d858384b2383414447c1bf6cf319ad72ea87d7030c6ca18b9bb774f73", + "zh:2f1d7c3461a6b59ffcf0eed2f3764e2f0a2c70464927e561d968d82112e3600d", + "zh:4705ce487e6b2c52376e1f9bc0dc650e8326ab3e20d0673c9fed62e1313d2d67", + "zh:5cd9a4ee36d3d7ffbabb90c83cb7cce54cf0f10c912db4be7492ebc1a78611b3", + "zh:688622dbac98fe95115518ff3d9324cf71ffdf124ca6e66b2269f43d9f8e7ceb", + "zh:7a5c07ae0728c7a57a63d848411c91550fd3bfe662f60821b50d3370be360134", + "zh:8a6472dec8082d7225a811c8ee0bf550c7a9c36e86cfd19b10363106f2dfbb80", + "zh:8e11d4c27e70500aaa1335cb721ad64c4b0e41b3c7398d6fe58a3d92f10ea213", + "zh:9a119c27e27bad73cdd8c0544f8a68a84bdac3de0129f13a87a6890ed19c6035", + "zh:dd12460d2b8b4497b5a7c46bb486ace9859d2fc642782989df315e618596d1e4", "zh:f569b65999264a9416862bca5cd2a6177d94ccb0424f3a4ef424428912b9cb3c", + "zh:fc35c660777b377978e5f2d008db6181ff2f98777cdd215effc11d665e99e0bc", ] } diff --git a/inputs/gcp/cloud_platform_service/google_project/auto_create_network/plan.json b/inputs/gcp/cloud_platform_service/google_project/auto_create_network/plan.json new file mode 100644 index 000000000..9e08f2ed1 --- /dev/null +++ b/inputs/gcp/cloud_platform_service/google_project/auto_create_network/plan.json @@ -0,0 +1 @@ +{"format_version":"1.2","terraform_version":"1.13.3","planned_values":{"root_module":{"resources":[{"address":"google_project.c123","mode":"managed","type":"google_project","name":"c123","provider_name":"registry.terraform.io/hashicorp/google","schema_version":1,"values":{"auto_create_network":false,"billing_account":null,"deletion_policy":"PREVENT","effective_labels":{"goog-terraform-provisioned":"true"},"folder_id":null,"labels":null,"name":"c123","org_id":"123456789","project_id":"proj-app-prod","tags":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"sensitive_values":{"effective_labels":{},"terraform_labels":{}}},{"address":"google_project.nc123","mode":"managed","type":"google_project","name":"nc123","provider_name":"registry.terraform.io/hashicorp/google","schema_version":1,"values":{"auto_create_network":true,"billing_account":null,"deletion_policy":"PREVENT","effective_labels":{"goog-terraform-provisioned":"true"},"folder_id":null,"labels":null,"name":"nc123","org_id":"123456789","project_id":"proj-sec-dev","tags":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"sensitive_values":{"effective_labels":{},"terraform_labels":{}}}]}},"resource_changes":[{"address":"google_project.c123","mode":"managed","type":"google_project","name":"c123","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"auto_create_network":false,"billing_account":null,"deletion_policy":"PREVENT","effective_labels":{"goog-terraform-provisioned":"true"},"folder_id":null,"labels":null,"name":"c123","org_id":"123456789","project_id":"proj-app-prod","tags":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"after_unknown":{"effective_labels":{},"id":true,"number":true,"terraform_labels":{}},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"terraform_labels":{}}}},{"address":"google_project.nc123","mode":"managed","type":"google_project","name":"nc123","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"auto_create_network":true,"billing_account":null,"deletion_policy":"PREVENT","effective_labels":{"goog-terraform-provisioned":"true"},"folder_id":null,"labels":null,"name":"nc123","org_id":"123456789","project_id":"proj-sec-dev","tags":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"after_unknown":{"effective_labels":{},"id":true,"number":true,"terraform_labels":{}},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"terraform_labels":{}}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_project.c123","mode":"managed","type":"google_project","name":"c123","provider_config_key":"google","expressions":{"auto_create_network":{"constant_value":false},"deletion_policy":{"constant_value":"PREVENT"},"name":{"constant_value":"c123"},"org_id":{"constant_value":"123456789"},"project_id":{"constant_value":"proj-app-prod"}},"schema_version":1},{"address":"google_project.nc123","mode":"managed","type":"google_project","name":"nc123","provider_config_key":"google","expressions":{"auto_create_network":{"constant_value":true},"deletion_policy":{"constant_value":"PREVENT"},"name":{"constant_value":"nc123"},"org_id":{"constant_value":"123456789"},"project_id":{"constant_value":"proj-sec-dev"}},"schema_version":1}]}},"timestamp":"2026-02-11T08:59:34Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/cloud_platform_service/google_project/billing_account/.terraform.lock.hcl b/inputs/gcp/cloud_platform_service/google_project/billing_account/.terraform.lock.hcl index 6c2d3da9f..2d35c134a 100644 --- a/inputs/gcp/cloud_platform_service/google_project/billing_account/.terraform.lock.hcl +++ b/inputs/gcp/cloud_platform_service/google_project/billing_account/.terraform.lock.hcl @@ -2,20 +2,20 @@ # Manual edits may be lost in future updates. provider "registry.terraform.io/hashicorp/google" { - version = "7.1.1" + version = "7.19.0" hashes = [ - "h1:Hu/Gy8dB7TXsUyswqm6XJhr7esYmXk9Ea/Jo9VgT4LE=", - "zh:03ee9fdc0d157a606aba68658de6dc809fc3335cccb7c537373d8643412c1327", - "zh:110e8ffe81deb8c203ecf310a15c2dedca1dfc936473a247b8a4f98adebd86f5", - "zh:459e3419c004e7a475fb60cc52d47a34b3dc4e4de905eaa8e8f78ddbe550a9b5", - "zh:466cd31cee36877bc18aeabed80d1f4a22bac4e59a460be6e8bdb72dedca0e2b", - "zh:51d707eb2d854fa16dcbe21e29b01534eb893a2152a219ea84a15bbd87a4ff64", - "zh:69d6a1c83ffddd7f81273a98fb0ff7c13985a3c876565dd3df76c730c9929871", - "zh:9b5050da221735c7e8f75ed00d25578afaf8ed94a8c2f1f58f471eee98105d10", - "zh:ab01f2fd961ee86d99a55186093620d29f5323c0cd5613284d484e333679d70b", - "zh:d0f5b15774b15991baf71eb4a55a6831e3fb4b603f589f80b03393b46a9657a4", - "zh:dc198ec4b42435321f4fa12ca8d713cd350ff2f82d8749b87785b91b15b7c3ed", - "zh:e949c00ce89c92b7ed16cc0b0aed8e80d6416b240dc02047f9fa1de49aa4c44e", + "h1:8lfoMp5YTC0pDT5da1fOJNnEaCm8JWClTo51g9ceipE=", + "zh:06da157d858384b2383414447c1bf6cf319ad72ea87d7030c6ca18b9bb774f73", + "zh:2f1d7c3461a6b59ffcf0eed2f3764e2f0a2c70464927e561d968d82112e3600d", + "zh:4705ce487e6b2c52376e1f9bc0dc650e8326ab3e20d0673c9fed62e1313d2d67", + "zh:5cd9a4ee36d3d7ffbabb90c83cb7cce54cf0f10c912db4be7492ebc1a78611b3", + "zh:688622dbac98fe95115518ff3d9324cf71ffdf124ca6e66b2269f43d9f8e7ceb", + "zh:7a5c07ae0728c7a57a63d848411c91550fd3bfe662f60821b50d3370be360134", + "zh:8a6472dec8082d7225a811c8ee0bf550c7a9c36e86cfd19b10363106f2dfbb80", + "zh:8e11d4c27e70500aaa1335cb721ad64c4b0e41b3c7398d6fe58a3d92f10ea213", + "zh:9a119c27e27bad73cdd8c0544f8a68a84bdac3de0129f13a87a6890ed19c6035", + "zh:dd12460d2b8b4497b5a7c46bb486ace9859d2fc642782989df315e618596d1e4", "zh:f569b65999264a9416862bca5cd2a6177d94ccb0424f3a4ef424428912b9cb3c", + "zh:fc35c660777b377978e5f2d008db6181ff2f98777cdd215effc11d665e99e0bc", ] } diff --git a/inputs/gcp/cloud_platform_service/google_project/billing_account/plan.json b/inputs/gcp/cloud_platform_service/google_project/billing_account/plan.json new file mode 100644 index 000000000..5da17bc68 --- /dev/null +++ b/inputs/gcp/cloud_platform_service/google_project/billing_account/plan.json @@ -0,0 +1 @@ +{"format_version":"1.2","terraform_version":"1.13.3","planned_values":{"root_module":{"resources":[{"address":"google_project.c123","mode":"managed","type":"google_project","name":"c123","provider_name":"registry.terraform.io/hashicorp/google","schema_version":1,"values":{"auto_create_network":false,"billing_account":"000000-000000-000000","deletion_policy":"PREVENT","effective_labels":{"goog-terraform-provisioned":"true"},"folder_id":null,"labels":null,"name":"c123","org_id":"123456789","project_id":"proj-app-dev","tags":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"sensitive_values":{"effective_labels":{},"terraform_labels":{}}},{"address":"google_project.nc123","mode":"managed","type":"google_project","name":"nc123","provider_name":"registry.terraform.io/hashicorp/google","schema_version":1,"values":{"auto_create_network":false,"billing_account":null,"deletion_policy":"PREVENT","effective_labels":{"goog-terraform-provisioned":"true"},"folder_id":null,"labels":null,"name":"nc123","org_id":"123456789","project_id":"proj-sec-test","tags":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"sensitive_values":{"effective_labels":{},"terraform_labels":{}}}]}},"resource_changes":[{"address":"google_project.c123","mode":"managed","type":"google_project","name":"c123","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"auto_create_network":false,"billing_account":"000000-000000-000000","deletion_policy":"PREVENT","effective_labels":{"goog-terraform-provisioned":"true"},"folder_id":null,"labels":null,"name":"c123","org_id":"123456789","project_id":"proj-app-dev","tags":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"after_unknown":{"effective_labels":{},"id":true,"number":true,"terraform_labels":{}},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"terraform_labels":{}}}},{"address":"google_project.nc123","mode":"managed","type":"google_project","name":"nc123","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"auto_create_network":false,"billing_account":null,"deletion_policy":"PREVENT","effective_labels":{"goog-terraform-provisioned":"true"},"folder_id":null,"labels":null,"name":"nc123","org_id":"123456789","project_id":"proj-sec-test","tags":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"after_unknown":{"effective_labels":{},"id":true,"number":true,"terraform_labels":{}},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"terraform_labels":{}}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_project.c123","mode":"managed","type":"google_project","name":"c123","provider_config_key":"google","expressions":{"auto_create_network":{"constant_value":false},"billing_account":{"constant_value":"000000-000000-000000"},"deletion_policy":{"constant_value":"PREVENT"},"name":{"constant_value":"c123"},"org_id":{"constant_value":"123456789"},"project_id":{"constant_value":"proj-app-dev"}},"schema_version":1},{"address":"google_project.nc123","mode":"managed","type":"google_project","name":"nc123","provider_config_key":"google","expressions":{"auto_create_network":{"constant_value":false},"billing_account":{"constant_value":null},"deletion_policy":{"constant_value":"PREVENT"},"name":{"constant_value":"nc123"},"org_id":{"constant_value":"123456789"},"project_id":{"constant_value":"proj-sec-test"}},"schema_version":1}]}},"timestamp":"2026-02-11T08:59:39Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/cloud_platform_service/google_project/deletion_policy/.terraform.lock.hcl b/inputs/gcp/cloud_platform_service/google_project/deletion_policy/.terraform.lock.hcl index 6c2d3da9f..2d35c134a 100644 --- a/inputs/gcp/cloud_platform_service/google_project/deletion_policy/.terraform.lock.hcl +++ b/inputs/gcp/cloud_platform_service/google_project/deletion_policy/.terraform.lock.hcl @@ -2,20 +2,20 @@ # Manual edits may be lost in future updates. provider "registry.terraform.io/hashicorp/google" { - version = "7.1.1" + version = "7.19.0" hashes = [ - "h1:Hu/Gy8dB7TXsUyswqm6XJhr7esYmXk9Ea/Jo9VgT4LE=", - "zh:03ee9fdc0d157a606aba68658de6dc809fc3335cccb7c537373d8643412c1327", - "zh:110e8ffe81deb8c203ecf310a15c2dedca1dfc936473a247b8a4f98adebd86f5", - "zh:459e3419c004e7a475fb60cc52d47a34b3dc4e4de905eaa8e8f78ddbe550a9b5", - "zh:466cd31cee36877bc18aeabed80d1f4a22bac4e59a460be6e8bdb72dedca0e2b", - "zh:51d707eb2d854fa16dcbe21e29b01534eb893a2152a219ea84a15bbd87a4ff64", - "zh:69d6a1c83ffddd7f81273a98fb0ff7c13985a3c876565dd3df76c730c9929871", - "zh:9b5050da221735c7e8f75ed00d25578afaf8ed94a8c2f1f58f471eee98105d10", - "zh:ab01f2fd961ee86d99a55186093620d29f5323c0cd5613284d484e333679d70b", - "zh:d0f5b15774b15991baf71eb4a55a6831e3fb4b603f589f80b03393b46a9657a4", - "zh:dc198ec4b42435321f4fa12ca8d713cd350ff2f82d8749b87785b91b15b7c3ed", - "zh:e949c00ce89c92b7ed16cc0b0aed8e80d6416b240dc02047f9fa1de49aa4c44e", + "h1:8lfoMp5YTC0pDT5da1fOJNnEaCm8JWClTo51g9ceipE=", + "zh:06da157d858384b2383414447c1bf6cf319ad72ea87d7030c6ca18b9bb774f73", + "zh:2f1d7c3461a6b59ffcf0eed2f3764e2f0a2c70464927e561d968d82112e3600d", + "zh:4705ce487e6b2c52376e1f9bc0dc650e8326ab3e20d0673c9fed62e1313d2d67", + "zh:5cd9a4ee36d3d7ffbabb90c83cb7cce54cf0f10c912db4be7492ebc1a78611b3", + "zh:688622dbac98fe95115518ff3d9324cf71ffdf124ca6e66b2269f43d9f8e7ceb", + "zh:7a5c07ae0728c7a57a63d848411c91550fd3bfe662f60821b50d3370be360134", + "zh:8a6472dec8082d7225a811c8ee0bf550c7a9c36e86cfd19b10363106f2dfbb80", + "zh:8e11d4c27e70500aaa1335cb721ad64c4b0e41b3c7398d6fe58a3d92f10ea213", + "zh:9a119c27e27bad73cdd8c0544f8a68a84bdac3de0129f13a87a6890ed19c6035", + "zh:dd12460d2b8b4497b5a7c46bb486ace9859d2fc642782989df315e618596d1e4", "zh:f569b65999264a9416862bca5cd2a6177d94ccb0424f3a4ef424428912b9cb3c", + "zh:fc35c660777b377978e5f2d008db6181ff2f98777cdd215effc11d665e99e0bc", ] } diff --git a/inputs/gcp/cloud_platform_service/google_project/deletion_policy/plan.json b/inputs/gcp/cloud_platform_service/google_project/deletion_policy/plan.json new file mode 100644 index 000000000..aaed5d4b7 --- /dev/null +++ b/inputs/gcp/cloud_platform_service/google_project/deletion_policy/plan.json @@ -0,0 +1 @@ +{"format_version":"1.2","terraform_version":"1.13.3","planned_values":{"root_module":{"resources":[{"address":"google_project.c123","mode":"managed","type":"google_project","name":"c123","provider_name":"registry.terraform.io/hashicorp/google","schema_version":1,"values":{"auto_create_network":false,"billing_account":null,"deletion_policy":"PREVENT","effective_labels":{"goog-terraform-provisioned":"true"},"folder_id":null,"labels":null,"name":"c123","org_id":"123456789","project_id":"proj-app-dev","tags":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"sensitive_values":{"effective_labels":{},"terraform_labels":{}}},{"address":"google_project.nc123","mode":"managed","type":"google_project","name":"nc123","provider_name":"registry.terraform.io/hashicorp/google","schema_version":1,"values":{"auto_create_network":false,"billing_account":null,"deletion_policy":"DELETE","effective_labels":{"goog-terraform-provisioned":"true"},"folder_id":null,"labels":null,"name":"nc123","org_id":"123456789","project_id":"proj-sec-test","tags":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"sensitive_values":{"effective_labels":{},"terraform_labels":{}}},{"address":"google_project.nc223","mode":"managed","type":"google_project","name":"nc223","provider_name":"registry.terraform.io/hashicorp/google","schema_version":1,"values":{"auto_create_network":false,"billing_account":null,"deletion_policy":"DELETE","effective_labels":{"goog-terraform-provisioned":"true"},"folder_id":null,"labels":null,"name":"nc223","org_id":"123456789","project_id":"proj-ops-test","tags":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"sensitive_values":{"effective_labels":{},"terraform_labels":{}}}]}},"resource_changes":[{"address":"google_project.c123","mode":"managed","type":"google_project","name":"c123","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"auto_create_network":false,"billing_account":null,"deletion_policy":"PREVENT","effective_labels":{"goog-terraform-provisioned":"true"},"folder_id":null,"labels":null,"name":"c123","org_id":"123456789","project_id":"proj-app-dev","tags":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"after_unknown":{"effective_labels":{},"id":true,"number":true,"terraform_labels":{}},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"terraform_labels":{}}}},{"address":"google_project.nc123","mode":"managed","type":"google_project","name":"nc123","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"auto_create_network":false,"billing_account":null,"deletion_policy":"DELETE","effective_labels":{"goog-terraform-provisioned":"true"},"folder_id":null,"labels":null,"name":"nc123","org_id":"123456789","project_id":"proj-sec-test","tags":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"after_unknown":{"effective_labels":{},"id":true,"number":true,"terraform_labels":{}},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"terraform_labels":{}}}},{"address":"google_project.nc223","mode":"managed","type":"google_project","name":"nc223","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"auto_create_network":false,"billing_account":null,"deletion_policy":"DELETE","effective_labels":{"goog-terraform-provisioned":"true"},"folder_id":null,"labels":null,"name":"nc223","org_id":"123456789","project_id":"proj-ops-test","tags":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"after_unknown":{"effective_labels":{},"id":true,"number":true,"terraform_labels":{}},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"terraform_labels":{}}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_project.c123","mode":"managed","type":"google_project","name":"c123","provider_config_key":"google","expressions":{"auto_create_network":{"constant_value":false},"deletion_policy":{"constant_value":"PREVENT"},"name":{"constant_value":"c123"},"org_id":{"constant_value":"123456789"},"project_id":{"constant_value":"proj-app-dev"}},"schema_version":1},{"address":"google_project.nc123","mode":"managed","type":"google_project","name":"nc123","provider_config_key":"google","expressions":{"auto_create_network":{"constant_value":false},"deletion_policy":{"constant_value":"DELETE"},"name":{"constant_value":"nc123"},"org_id":{"constant_value":"123456789"},"project_id":{"constant_value":"proj-sec-test"}},"schema_version":1},{"address":"google_project.nc223","mode":"managed","type":"google_project","name":"nc223","provider_config_key":"google","expressions":{"auto_create_network":{"constant_value":false},"deletion_policy":{"constant_value":"DELETE"},"name":{"constant_value":"nc223"},"org_id":{"constant_value":"123456789"},"project_id":{"constant_value":"proj-ops-test"}},"schema_version":1}]}},"timestamp":"2026-02-11T08:59:39Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/cloud_platform_service/google_project/labels/.terraform.lock.hcl b/inputs/gcp/cloud_platform_service/google_project/labels/.terraform.lock.hcl index 6c2d3da9f..2d35c134a 100644 --- a/inputs/gcp/cloud_platform_service/google_project/labels/.terraform.lock.hcl +++ b/inputs/gcp/cloud_platform_service/google_project/labels/.terraform.lock.hcl @@ -2,20 +2,20 @@ # Manual edits may be lost in future updates. provider "registry.terraform.io/hashicorp/google" { - version = "7.1.1" + version = "7.19.0" hashes = [ - "h1:Hu/Gy8dB7TXsUyswqm6XJhr7esYmXk9Ea/Jo9VgT4LE=", - "zh:03ee9fdc0d157a606aba68658de6dc809fc3335cccb7c537373d8643412c1327", - "zh:110e8ffe81deb8c203ecf310a15c2dedca1dfc936473a247b8a4f98adebd86f5", - "zh:459e3419c004e7a475fb60cc52d47a34b3dc4e4de905eaa8e8f78ddbe550a9b5", - "zh:466cd31cee36877bc18aeabed80d1f4a22bac4e59a460be6e8bdb72dedca0e2b", - "zh:51d707eb2d854fa16dcbe21e29b01534eb893a2152a219ea84a15bbd87a4ff64", - "zh:69d6a1c83ffddd7f81273a98fb0ff7c13985a3c876565dd3df76c730c9929871", - "zh:9b5050da221735c7e8f75ed00d25578afaf8ed94a8c2f1f58f471eee98105d10", - "zh:ab01f2fd961ee86d99a55186093620d29f5323c0cd5613284d484e333679d70b", - "zh:d0f5b15774b15991baf71eb4a55a6831e3fb4b603f589f80b03393b46a9657a4", - "zh:dc198ec4b42435321f4fa12ca8d713cd350ff2f82d8749b87785b91b15b7c3ed", - "zh:e949c00ce89c92b7ed16cc0b0aed8e80d6416b240dc02047f9fa1de49aa4c44e", + "h1:8lfoMp5YTC0pDT5da1fOJNnEaCm8JWClTo51g9ceipE=", + "zh:06da157d858384b2383414447c1bf6cf319ad72ea87d7030c6ca18b9bb774f73", + "zh:2f1d7c3461a6b59ffcf0eed2f3764e2f0a2c70464927e561d968d82112e3600d", + "zh:4705ce487e6b2c52376e1f9bc0dc650e8326ab3e20d0673c9fed62e1313d2d67", + "zh:5cd9a4ee36d3d7ffbabb90c83cb7cce54cf0f10c912db4be7492ebc1a78611b3", + "zh:688622dbac98fe95115518ff3d9324cf71ffdf124ca6e66b2269f43d9f8e7ceb", + "zh:7a5c07ae0728c7a57a63d848411c91550fd3bfe662f60821b50d3370be360134", + "zh:8a6472dec8082d7225a811c8ee0bf550c7a9c36e86cfd19b10363106f2dfbb80", + "zh:8e11d4c27e70500aaa1335cb721ad64c4b0e41b3c7398d6fe58a3d92f10ea213", + "zh:9a119c27e27bad73cdd8c0544f8a68a84bdac3de0129f13a87a6890ed19c6035", + "zh:dd12460d2b8b4497b5a7c46bb486ace9859d2fc642782989df315e618596d1e4", "zh:f569b65999264a9416862bca5cd2a6177d94ccb0424f3a4ef424428912b9cb3c", + "zh:fc35c660777b377978e5f2d008db6181ff2f98777cdd215effc11d665e99e0bc", ] } diff --git a/inputs/gcp/cloud_platform_service/google_project/labels/plan.json b/inputs/gcp/cloud_platform_service/google_project/labels/plan.json new file mode 100644 index 000000000..76c15ede7 --- /dev/null +++ b/inputs/gcp/cloud_platform_service/google_project/labels/plan.json @@ -0,0 +1 @@ +{"format_version":"1.2","terraform_version":"1.13.3","planned_values":{"root_module":{"resources":[{"address":"google_project.c123","mode":"managed","type":"google_project","name":"c123","provider_name":"registry.terraform.io/hashicorp/google","schema_version":1,"values":{"auto_create_network":true,"billing_account":null,"deletion_policy":"PREVENT","effective_labels":{"env":"dev","goog-terraform-provisioned":"true","owner":"security-team","team":"infra"},"folder_id":null,"labels":{"env":"dev","owner":"security-team","team":"infra"},"name":"c123","org_id":"123456789012","project_id":"proj-sec-test","tags":null,"terraform_labels":{"env":"dev","goog-terraform-provisioned":"true","owner":"security-team","team":"infra"},"timeouts":null},"sensitive_values":{"effective_labels":{},"labels":{},"terraform_labels":{}}},{"address":"google_project.nc123","mode":"managed","type":"google_project","name":"nc123","provider_name":"registry.terraform.io/hashicorp/google","schema_version":1,"values":{"auto_create_network":true,"billing_account":null,"deletion_policy":"PREVENT","effective_labels":{"goog-terraform-provisioned":"true"},"folder_id":null,"labels":null,"name":"nc123","org_id":"83838389292","project_id":"proj-app-test","tags":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"sensitive_values":{"effective_labels":{},"terraform_labels":{}}}]}},"resource_changes":[{"address":"google_project.c123","mode":"managed","type":"google_project","name":"c123","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"auto_create_network":true,"billing_account":null,"deletion_policy":"PREVENT","effective_labels":{"env":"dev","goog-terraform-provisioned":"true","owner":"security-team","team":"infra"},"folder_id":null,"labels":{"env":"dev","owner":"security-team","team":"infra"},"name":"c123","org_id":"123456789012","project_id":"proj-sec-test","tags":null,"terraform_labels":{"env":"dev","goog-terraform-provisioned":"true","owner":"security-team","team":"infra"},"timeouts":null},"after_unknown":{"effective_labels":{},"id":true,"labels":{},"number":true,"terraform_labels":{}},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"labels":{},"terraform_labels":{}}}},{"address":"google_project.nc123","mode":"managed","type":"google_project","name":"nc123","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"auto_create_network":true,"billing_account":null,"deletion_policy":"PREVENT","effective_labels":{"goog-terraform-provisioned":"true"},"folder_id":null,"labels":null,"name":"nc123","org_id":"83838389292","project_id":"proj-app-test","tags":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"after_unknown":{"effective_labels":{},"id":true,"number":true,"terraform_labels":{}},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"terraform_labels":{}}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_project.c123","mode":"managed","type":"google_project","name":"c123","provider_config_key":"google","expressions":{"labels":{"constant_value":{"env":"dev","owner":"security-team","team":"infra"}},"name":{"constant_value":"c123"},"org_id":{"constant_value":"123456789012"},"project_id":{"constant_value":"proj-sec-test"}},"schema_version":1},{"address":"google_project.nc123","mode":"managed","type":"google_project","name":"nc123","provider_config_key":"google","expressions":{"name":{"constant_value":"nc123"},"org_id":{"constant_value":"83838389292"},"project_id":{"constant_value":"proj-app-test"}},"schema_version":1}]}},"timestamp":"2026-02-11T08:59:39Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/cloud_platform_service/google_project/org_id/.terraform.lock.hcl b/inputs/gcp/cloud_platform_service/google_project/org_id/.terraform.lock.hcl index 6c2d3da9f..2d35c134a 100644 --- a/inputs/gcp/cloud_platform_service/google_project/org_id/.terraform.lock.hcl +++ b/inputs/gcp/cloud_platform_service/google_project/org_id/.terraform.lock.hcl @@ -2,20 +2,20 @@ # Manual edits may be lost in future updates. provider "registry.terraform.io/hashicorp/google" { - version = "7.1.1" + version = "7.19.0" hashes = [ - "h1:Hu/Gy8dB7TXsUyswqm6XJhr7esYmXk9Ea/Jo9VgT4LE=", - "zh:03ee9fdc0d157a606aba68658de6dc809fc3335cccb7c537373d8643412c1327", - "zh:110e8ffe81deb8c203ecf310a15c2dedca1dfc936473a247b8a4f98adebd86f5", - "zh:459e3419c004e7a475fb60cc52d47a34b3dc4e4de905eaa8e8f78ddbe550a9b5", - "zh:466cd31cee36877bc18aeabed80d1f4a22bac4e59a460be6e8bdb72dedca0e2b", - "zh:51d707eb2d854fa16dcbe21e29b01534eb893a2152a219ea84a15bbd87a4ff64", - "zh:69d6a1c83ffddd7f81273a98fb0ff7c13985a3c876565dd3df76c730c9929871", - "zh:9b5050da221735c7e8f75ed00d25578afaf8ed94a8c2f1f58f471eee98105d10", - "zh:ab01f2fd961ee86d99a55186093620d29f5323c0cd5613284d484e333679d70b", - "zh:d0f5b15774b15991baf71eb4a55a6831e3fb4b603f589f80b03393b46a9657a4", - "zh:dc198ec4b42435321f4fa12ca8d713cd350ff2f82d8749b87785b91b15b7c3ed", - "zh:e949c00ce89c92b7ed16cc0b0aed8e80d6416b240dc02047f9fa1de49aa4c44e", + "h1:8lfoMp5YTC0pDT5da1fOJNnEaCm8JWClTo51g9ceipE=", + "zh:06da157d858384b2383414447c1bf6cf319ad72ea87d7030c6ca18b9bb774f73", + "zh:2f1d7c3461a6b59ffcf0eed2f3764e2f0a2c70464927e561d968d82112e3600d", + "zh:4705ce487e6b2c52376e1f9bc0dc650e8326ab3e20d0673c9fed62e1313d2d67", + "zh:5cd9a4ee36d3d7ffbabb90c83cb7cce54cf0f10c912db4be7492ebc1a78611b3", + "zh:688622dbac98fe95115518ff3d9324cf71ffdf124ca6e66b2269f43d9f8e7ceb", + "zh:7a5c07ae0728c7a57a63d848411c91550fd3bfe662f60821b50d3370be360134", + "zh:8a6472dec8082d7225a811c8ee0bf550c7a9c36e86cfd19b10363106f2dfbb80", + "zh:8e11d4c27e70500aaa1335cb721ad64c4b0e41b3c7398d6fe58a3d92f10ea213", + "zh:9a119c27e27bad73cdd8c0544f8a68a84bdac3de0129f13a87a6890ed19c6035", + "zh:dd12460d2b8b4497b5a7c46bb486ace9859d2fc642782989df315e618596d1e4", "zh:f569b65999264a9416862bca5cd2a6177d94ccb0424f3a4ef424428912b9cb3c", + "zh:fc35c660777b377978e5f2d008db6181ff2f98777cdd215effc11d665e99e0bc", ] } diff --git a/inputs/gcp/cloud_platform_service/google_project/org_id/c.tf b/inputs/gcp/cloud_platform_service/google_project/org_id/c.tf index dcba42b0e..b0386d4a2 100644 --- a/inputs/gcp/cloud_platform_service/google_project/org_id/c.tf +++ b/inputs/gcp/cloud_platform_service/google_project/org_id/c.tf @@ -1,17 +1,8 @@ # Compliant: org_id set -resource "google_project" "c123" { +resource "google_project" "c" { name = "c123" - project_id = "proj-app-dev" + project_id = "c" org_id = "123456789" auto_create_network = false deletion_policy = "PREVENT" } - -# Compliant: folder_id set (org_id omitted) -resource "google_project" "c223" { - name = "c223" - project_id = "proj-sec-test" - folder_id = "987654321" - auto_create_network = false - deletion_policy = "PREVENT" -} diff --git a/inputs/gcp/cloud_platform_service/google_project/org_id/nc.tf b/inputs/gcp/cloud_platform_service/google_project/org_id/nc.tf index c86f70200..fc77b8a5c 100644 --- a/inputs/gcp/cloud_platform_service/google_project/org_id/nc.tf +++ b/inputs/gcp/cloud_platform_service/google_project/org_id/nc.tf @@ -1,15 +1,7 @@ -# Non-compliant: both org_id and folder_id missing -resource "google_project" "nc123" { - name = "nc123" - project_id = "proj-ops-production" # it'll show this id since org_ & folder_id missing - auto_create_network = false - deletion_policy = "PREVENT" -} - # Non-compliant: explicitly nulls (some generators may render nulls) -resource "google_project" "nc223" { +resource "google_project" "nc" { name = "nc223" - project_id = "proj-app-test" # it'll show this id since both are null + project_id = "nc" # it'll show this id since both are null org_id = null folder_id = null auto_create_network = false diff --git a/inputs/gcp/cloud_platform_service/google_project/org_id/plan.json b/inputs/gcp/cloud_platform_service/google_project/org_id/plan.json new file mode 100644 index 000000000..dbece5250 --- /dev/null +++ b/inputs/gcp/cloud_platform_service/google_project/org_id/plan.json @@ -0,0 +1 @@ +{"format_version":"1.2","terraform_version":"1.13.3","planned_values":{"root_module":{"resources":[{"address":"google_project.c","mode":"managed","type":"google_project","name":"c","provider_name":"registry.terraform.io/hashicorp/google","schema_version":1,"values":{"auto_create_network":false,"billing_account":null,"deletion_policy":"PREVENT","effective_labels":{"goog-terraform-provisioned":"true"},"folder_id":null,"labels":null,"name":"c123","org_id":"123456789","project_id":"c","tags":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"sensitive_values":{"effective_labels":{},"terraform_labels":{}}},{"address":"google_project.nc","mode":"managed","type":"google_project","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":1,"values":{"auto_create_network":false,"billing_account":null,"deletion_policy":"PREVENT","effective_labels":{"goog-terraform-provisioned":"true"},"folder_id":null,"labels":null,"name":"nc223","org_id":null,"project_id":"nc","tags":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"sensitive_values":{"effective_labels":{},"terraform_labels":{}}}]}},"resource_changes":[{"address":"google_project.c","mode":"managed","type":"google_project","name":"c","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"auto_create_network":false,"billing_account":null,"deletion_policy":"PREVENT","effective_labels":{"goog-terraform-provisioned":"true"},"folder_id":null,"labels":null,"name":"c123","org_id":"123456789","project_id":"c","tags":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"after_unknown":{"effective_labels":{},"id":true,"number":true,"terraform_labels":{}},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"terraform_labels":{}}}},{"address":"google_project.nc","mode":"managed","type":"google_project","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"auto_create_network":false,"billing_account":null,"deletion_policy":"PREVENT","effective_labels":{"goog-terraform-provisioned":"true"},"folder_id":null,"labels":null,"name":"nc223","org_id":null,"project_id":"nc","tags":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"after_unknown":{"effective_labels":{},"id":true,"number":true,"terraform_labels":{}},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"terraform_labels":{}}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_project.c","mode":"managed","type":"google_project","name":"c","provider_config_key":"google","expressions":{"auto_create_network":{"constant_value":false},"deletion_policy":{"constant_value":"PREVENT"},"name":{"constant_value":"c123"},"org_id":{"constant_value":"123456789"},"project_id":{"constant_value":"c"}},"schema_version":1},{"address":"google_project.nc","mode":"managed","type":"google_project","name":"nc","provider_config_key":"google","expressions":{"auto_create_network":{"constant_value":false},"deletion_policy":{"constant_value":"PREVENT"},"folder_id":{"constant_value":null},"name":{"constant_value":"nc223"},"org_id":{"constant_value":null},"project_id":{"constant_value":"nc"}},"schema_version":1}]}},"timestamp":"2026-02-11T08:59:39Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/cloud_platform_service/google_project/project_id/.terraform.lock.hcl b/inputs/gcp/cloud_platform_service/google_project/project_id/.terraform.lock.hcl index 6c2d3da9f..2d35c134a 100644 --- a/inputs/gcp/cloud_platform_service/google_project/project_id/.terraform.lock.hcl +++ b/inputs/gcp/cloud_platform_service/google_project/project_id/.terraform.lock.hcl @@ -2,20 +2,20 @@ # Manual edits may be lost in future updates. provider "registry.terraform.io/hashicorp/google" { - version = "7.1.1" + version = "7.19.0" hashes = [ - "h1:Hu/Gy8dB7TXsUyswqm6XJhr7esYmXk9Ea/Jo9VgT4LE=", - "zh:03ee9fdc0d157a606aba68658de6dc809fc3335cccb7c537373d8643412c1327", - "zh:110e8ffe81deb8c203ecf310a15c2dedca1dfc936473a247b8a4f98adebd86f5", - "zh:459e3419c004e7a475fb60cc52d47a34b3dc4e4de905eaa8e8f78ddbe550a9b5", - "zh:466cd31cee36877bc18aeabed80d1f4a22bac4e59a460be6e8bdb72dedca0e2b", - "zh:51d707eb2d854fa16dcbe21e29b01534eb893a2152a219ea84a15bbd87a4ff64", - "zh:69d6a1c83ffddd7f81273a98fb0ff7c13985a3c876565dd3df76c730c9929871", - "zh:9b5050da221735c7e8f75ed00d25578afaf8ed94a8c2f1f58f471eee98105d10", - "zh:ab01f2fd961ee86d99a55186093620d29f5323c0cd5613284d484e333679d70b", - "zh:d0f5b15774b15991baf71eb4a55a6831e3fb4b603f589f80b03393b46a9657a4", - "zh:dc198ec4b42435321f4fa12ca8d713cd350ff2f82d8749b87785b91b15b7c3ed", - "zh:e949c00ce89c92b7ed16cc0b0aed8e80d6416b240dc02047f9fa1de49aa4c44e", + "h1:8lfoMp5YTC0pDT5da1fOJNnEaCm8JWClTo51g9ceipE=", + "zh:06da157d858384b2383414447c1bf6cf319ad72ea87d7030c6ca18b9bb774f73", + "zh:2f1d7c3461a6b59ffcf0eed2f3764e2f0a2c70464927e561d968d82112e3600d", + "zh:4705ce487e6b2c52376e1f9bc0dc650e8326ab3e20d0673c9fed62e1313d2d67", + "zh:5cd9a4ee36d3d7ffbabb90c83cb7cce54cf0f10c912db4be7492ebc1a78611b3", + "zh:688622dbac98fe95115518ff3d9324cf71ffdf124ca6e66b2269f43d9f8e7ceb", + "zh:7a5c07ae0728c7a57a63d848411c91550fd3bfe662f60821b50d3370be360134", + "zh:8a6472dec8082d7225a811c8ee0bf550c7a9c36e86cfd19b10363106f2dfbb80", + "zh:8e11d4c27e70500aaa1335cb721ad64c4b0e41b3c7398d6fe58a3d92f10ea213", + "zh:9a119c27e27bad73cdd8c0544f8a68a84bdac3de0129f13a87a6890ed19c6035", + "zh:dd12460d2b8b4497b5a7c46bb486ace9859d2fc642782989df315e618596d1e4", "zh:f569b65999264a9416862bca5cd2a6177d94ccb0424f3a4ef424428912b9cb3c", + "zh:fc35c660777b377978e5f2d008db6181ff2f98777cdd215effc11d665e99e0bc", ] } diff --git a/inputs/gcp/cloud_platform_service/google_project/project_id/plan.json b/inputs/gcp/cloud_platform_service/google_project/project_id/plan.json new file mode 100644 index 000000000..342efbc00 --- /dev/null +++ b/inputs/gcp/cloud_platform_service/google_project/project_id/plan.json @@ -0,0 +1 @@ +{"format_version":"1.2","terraform_version":"1.13.3","planned_values":{"root_module":{"resources":[{"address":"google_project.c123","mode":"managed","type":"google_project","name":"c123","provider_name":"registry.terraform.io/hashicorp/google","schema_version":1,"values":{"auto_create_network":false,"billing_account":null,"deletion_policy":"PREVENT","effective_labels":{"goog-terraform-provisioned":"true"},"folder_id":null,"labels":null,"name":"c123","org_id":"123456789","project_id":"proj-app-dev","tags":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"sensitive_values":{"effective_labels":{},"terraform_labels":{}}},{"address":"google_project.c223","mode":"managed","type":"google_project","name":"c223","provider_name":"registry.terraform.io/hashicorp/google","schema_version":1,"values":{"auto_create_network":false,"billing_account":null,"deletion_policy":"PREVENT","effective_labels":{"goog-terraform-provisioned":"true"},"folder_id":null,"labels":null,"name":"c223","org_id":"123456789","project_id":"proj-sec-prod","tags":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"sensitive_values":{"effective_labels":{},"terraform_labels":{}}},{"address":"google_project.c323","mode":"managed","type":"google_project","name":"c323","provider_name":"registry.terraform.io/hashicorp/google","schema_version":1,"values":{"auto_create_network":false,"billing_account":null,"deletion_policy":"PREVENT","effective_labels":{"goog-terraform-provisioned":"true"},"folder_id":null,"labels":null,"name":"c323","org_id":"123456789","project_id":"proj-app-prod","tags":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"sensitive_values":{"effective_labels":{},"terraform_labels":{}}},{"address":"google_project.nc123","mode":"managed","type":"google_project","name":"nc123","provider_name":"registry.terraform.io/hashicorp/google","schema_version":1,"values":{"auto_create_network":false,"billing_account":null,"deletion_policy":"PREVENT","effective_labels":{"goog-terraform-provisioned":"true"},"folder_id":null,"labels":null,"name":"nc123","org_id":"123456789","project_id":"project-app-dev","tags":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"sensitive_values":{"effective_labels":{},"terraform_labels":{}}},{"address":"google_project.nc223","mode":"managed","type":"google_project","name":"nc223","provider_name":"registry.terraform.io/hashicorp/google","schema_version":1,"values":{"auto_create_network":false,"billing_account":null,"deletion_policy":"PREVENT","effective_labels":{"goog-terraform-provisioned":"true"},"folder_id":null,"labels":null,"name":"nc223","org_id":"123456789","project_id":"proj-ops-staging","tags":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"sensitive_values":{"effective_labels":{},"terraform_labels":{}}},{"address":"google_project.nc323","mode":"managed","type":"google_project","name":"nc323","provider_name":"registry.terraform.io/hashicorp/google","schema_version":1,"values":{"auto_create_network":false,"billing_account":null,"deletion_policy":"PREVENT","effective_labels":{"goog-terraform-provisioned":"true"},"folder_id":null,"labels":null,"name":"nc323","org_id":"123456789","project_id":"myproject-prod-01","tags":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"sensitive_values":{"effective_labels":{},"terraform_labels":{}}}]}},"resource_changes":[{"address":"google_project.c123","mode":"managed","type":"google_project","name":"c123","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"auto_create_network":false,"billing_account":null,"deletion_policy":"PREVENT","effective_labels":{"goog-terraform-provisioned":"true"},"folder_id":null,"labels":null,"name":"c123","org_id":"123456789","project_id":"proj-app-dev","tags":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"after_unknown":{"effective_labels":{},"id":true,"number":true,"terraform_labels":{}},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"terraform_labels":{}}}},{"address":"google_project.c223","mode":"managed","type":"google_project","name":"c223","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"auto_create_network":false,"billing_account":null,"deletion_policy":"PREVENT","effective_labels":{"goog-terraform-provisioned":"true"},"folder_id":null,"labels":null,"name":"c223","org_id":"123456789","project_id":"proj-sec-prod","tags":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"after_unknown":{"effective_labels":{},"id":true,"number":true,"terraform_labels":{}},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"terraform_labels":{}}}},{"address":"google_project.c323","mode":"managed","type":"google_project","name":"c323","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"auto_create_network":false,"billing_account":null,"deletion_policy":"PREVENT","effective_labels":{"goog-terraform-provisioned":"true"},"folder_id":null,"labels":null,"name":"c323","org_id":"123456789","project_id":"proj-app-prod","tags":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"after_unknown":{"effective_labels":{},"id":true,"number":true,"terraform_labels":{}},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"terraform_labels":{}}}},{"address":"google_project.nc123","mode":"managed","type":"google_project","name":"nc123","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"auto_create_network":false,"billing_account":null,"deletion_policy":"PREVENT","effective_labels":{"goog-terraform-provisioned":"true"},"folder_id":null,"labels":null,"name":"nc123","org_id":"123456789","project_id":"project-app-dev","tags":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"after_unknown":{"effective_labels":{},"id":true,"number":true,"terraform_labels":{}},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"terraform_labels":{}}}},{"address":"google_project.nc223","mode":"managed","type":"google_project","name":"nc223","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"auto_create_network":false,"billing_account":null,"deletion_policy":"PREVENT","effective_labels":{"goog-terraform-provisioned":"true"},"folder_id":null,"labels":null,"name":"nc223","org_id":"123456789","project_id":"proj-ops-staging","tags":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"after_unknown":{"effective_labels":{},"id":true,"number":true,"terraform_labels":{}},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"terraform_labels":{}}}},{"address":"google_project.nc323","mode":"managed","type":"google_project","name":"nc323","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"auto_create_network":false,"billing_account":null,"deletion_policy":"PREVENT","effective_labels":{"goog-terraform-provisioned":"true"},"folder_id":null,"labels":null,"name":"nc323","org_id":"123456789","project_id":"myproject-prod-01","tags":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"after_unknown":{"effective_labels":{},"id":true,"number":true,"terraform_labels":{}},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"terraform_labels":{}}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_project.c123","mode":"managed","type":"google_project","name":"c123","provider_config_key":"google","expressions":{"auto_create_network":{"constant_value":false},"deletion_policy":{"constant_value":"PREVENT"},"name":{"constant_value":"c123"},"org_id":{"constant_value":"123456789"},"project_id":{"constant_value":"proj-app-dev"}},"schema_version":1},{"address":"google_project.c223","mode":"managed","type":"google_project","name":"c223","provider_config_key":"google","expressions":{"auto_create_network":{"constant_value":false},"deletion_policy":{"constant_value":"PREVENT"},"name":{"constant_value":"c223"},"org_id":{"constant_value":"123456789"},"project_id":{"constant_value":"proj-sec-prod"}},"schema_version":1},{"address":"google_project.c323","mode":"managed","type":"google_project","name":"c323","provider_config_key":"google","expressions":{"auto_create_network":{"constant_value":false},"name":{"constant_value":"c323"},"org_id":{"constant_value":"123456789"},"project_id":{"constant_value":"proj-app-prod"}},"schema_version":1},{"address":"google_project.nc123","mode":"managed","type":"google_project","name":"nc123","provider_config_key":"google","expressions":{"auto_create_network":{"constant_value":false},"deletion_policy":{"constant_value":"PREVENT"},"name":{"constant_value":"nc123"},"org_id":{"constant_value":"123456789"},"project_id":{"constant_value":"project-app-dev"}},"schema_version":1},{"address":"google_project.nc223","mode":"managed","type":"google_project","name":"nc223","provider_config_key":"google","expressions":{"auto_create_network":{"constant_value":false},"deletion_policy":{"constant_value":"PREVENT"},"name":{"constant_value":"nc223"},"org_id":{"constant_value":"123456789"},"project_id":{"constant_value":"proj-ops-staging"}},"schema_version":1},{"address":"google_project.nc323","mode":"managed","type":"google_project","name":"nc323","provider_config_key":"google","expressions":{"auto_create_network":{"constant_value":false},"name":{"constant_value":"nc323"},"org_id":{"constant_value":"123456789"},"project_id":{"constant_value":"myproject-prod-01"}},"schema_version":1}]}},"timestamp":"2026-02-11T08:59:44Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/cloud_platform_service/google_project/tags/.terraform.lock.hcl b/inputs/gcp/cloud_platform_service/google_project/tags/.terraform.lock.hcl index 6c2d3da9f..2d35c134a 100644 --- a/inputs/gcp/cloud_platform_service/google_project/tags/.terraform.lock.hcl +++ b/inputs/gcp/cloud_platform_service/google_project/tags/.terraform.lock.hcl @@ -2,20 +2,20 @@ # Manual edits may be lost in future updates. provider "registry.terraform.io/hashicorp/google" { - version = "7.1.1" + version = "7.19.0" hashes = [ - "h1:Hu/Gy8dB7TXsUyswqm6XJhr7esYmXk9Ea/Jo9VgT4LE=", - "zh:03ee9fdc0d157a606aba68658de6dc809fc3335cccb7c537373d8643412c1327", - "zh:110e8ffe81deb8c203ecf310a15c2dedca1dfc936473a247b8a4f98adebd86f5", - "zh:459e3419c004e7a475fb60cc52d47a34b3dc4e4de905eaa8e8f78ddbe550a9b5", - "zh:466cd31cee36877bc18aeabed80d1f4a22bac4e59a460be6e8bdb72dedca0e2b", - "zh:51d707eb2d854fa16dcbe21e29b01534eb893a2152a219ea84a15bbd87a4ff64", - "zh:69d6a1c83ffddd7f81273a98fb0ff7c13985a3c876565dd3df76c730c9929871", - "zh:9b5050da221735c7e8f75ed00d25578afaf8ed94a8c2f1f58f471eee98105d10", - "zh:ab01f2fd961ee86d99a55186093620d29f5323c0cd5613284d484e333679d70b", - "zh:d0f5b15774b15991baf71eb4a55a6831e3fb4b603f589f80b03393b46a9657a4", - "zh:dc198ec4b42435321f4fa12ca8d713cd350ff2f82d8749b87785b91b15b7c3ed", - "zh:e949c00ce89c92b7ed16cc0b0aed8e80d6416b240dc02047f9fa1de49aa4c44e", + "h1:8lfoMp5YTC0pDT5da1fOJNnEaCm8JWClTo51g9ceipE=", + "zh:06da157d858384b2383414447c1bf6cf319ad72ea87d7030c6ca18b9bb774f73", + "zh:2f1d7c3461a6b59ffcf0eed2f3764e2f0a2c70464927e561d968d82112e3600d", + "zh:4705ce487e6b2c52376e1f9bc0dc650e8326ab3e20d0673c9fed62e1313d2d67", + "zh:5cd9a4ee36d3d7ffbabb90c83cb7cce54cf0f10c912db4be7492ebc1a78611b3", + "zh:688622dbac98fe95115518ff3d9324cf71ffdf124ca6e66b2269f43d9f8e7ceb", + "zh:7a5c07ae0728c7a57a63d848411c91550fd3bfe662f60821b50d3370be360134", + "zh:8a6472dec8082d7225a811c8ee0bf550c7a9c36e86cfd19b10363106f2dfbb80", + "zh:8e11d4c27e70500aaa1335cb721ad64c4b0e41b3c7398d6fe58a3d92f10ea213", + "zh:9a119c27e27bad73cdd8c0544f8a68a84bdac3de0129f13a87a6890ed19c6035", + "zh:dd12460d2b8b4497b5a7c46bb486ace9859d2fc642782989df315e618596d1e4", "zh:f569b65999264a9416862bca5cd2a6177d94ccb0424f3a4ef424428912b9cb3c", + "zh:fc35c660777b377978e5f2d008db6181ff2f98777cdd215effc11d665e99e0bc", ] } diff --git a/inputs/gcp/cloud_platform_service/google_project/tags/plan.json b/inputs/gcp/cloud_platform_service/google_project/tags/plan.json new file mode 100644 index 000000000..d7ceecdcd --- /dev/null +++ b/inputs/gcp/cloud_platform_service/google_project/tags/plan.json @@ -0,0 +1 @@ +{"format_version":"1.2","terraform_version":"1.13.3","planned_values":{"root_module":{"resources":[{"address":"google_project.c123","mode":"managed","type":"google_project","name":"c123","provider_name":"registry.terraform.io/hashicorp/google","schema_version":1,"values":{"auto_create_network":false,"billing_account":null,"deletion_policy":"PREVENT","effective_labels":{"goog-terraform-provisioned":"true"},"folder_id":null,"labels":null,"name":"c123","org_id":"123456789","project_id":"proj-app-dev","tags":{"tagKeys/env":"tagValues/dev"},"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"sensitive_values":{"effective_labels":{},"tags":{},"terraform_labels":{}}},{"address":"google_project.nc123","mode":"managed","type":"google_project","name":"nc123","provider_name":"registry.terraform.io/hashicorp/google","schema_version":1,"values":{"auto_create_network":false,"billing_account":null,"deletion_policy":"PREVENT","effective_labels":{"goog-terraform-provisioned":"true"},"folder_id":null,"labels":null,"name":"nc123","org_id":"123456789","project_id":"proj-sec-test","tags":{"tagKeys/env":"tagValues/staging"},"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"sensitive_values":{"effective_labels":{},"tags":{},"terraform_labels":{}}}]}},"resource_changes":[{"address":"google_project.c123","mode":"managed","type":"google_project","name":"c123","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"auto_create_network":false,"billing_account":null,"deletion_policy":"PREVENT","effective_labels":{"goog-terraform-provisioned":"true"},"folder_id":null,"labels":null,"name":"c123","org_id":"123456789","project_id":"proj-app-dev","tags":{"tagKeys/env":"tagValues/dev"},"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"after_unknown":{"effective_labels":{},"id":true,"number":true,"tags":{},"terraform_labels":{}},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"tags":{},"terraform_labels":{}}}},{"address":"google_project.nc123","mode":"managed","type":"google_project","name":"nc123","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"auto_create_network":false,"billing_account":null,"deletion_policy":"PREVENT","effective_labels":{"goog-terraform-provisioned":"true"},"folder_id":null,"labels":null,"name":"nc123","org_id":"123456789","project_id":"proj-sec-test","tags":{"tagKeys/env":"tagValues/staging"},"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"after_unknown":{"effective_labels":{},"id":true,"number":true,"tags":{},"terraform_labels":{}},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"tags":{},"terraform_labels":{}}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_project.c123","mode":"managed","type":"google_project","name":"c123","provider_config_key":"google","expressions":{"auto_create_network":{"constant_value":false},"deletion_policy":{"constant_value":"PREVENT"},"name":{"constant_value":"c123"},"org_id":{"constant_value":"123456789"},"project_id":{"constant_value":"proj-app-dev"},"tags":{"constant_value":{"tagKeys/env":"tagValues/dev"}}},"schema_version":1},{"address":"google_project.nc123","mode":"managed","type":"google_project","name":"nc123","provider_config_key":"google","expressions":{"auto_create_network":{"constant_value":false},"deletion_policy":{"constant_value":"PREVENT"},"name":{"constant_value":"nc123"},"org_id":{"constant_value":"123456789"},"project_id":{"constant_value":"proj-sec-test"},"tags":{"constant_value":{"tagKeys/env":"tagValues/staging"}}},"schema_version":1}]}},"timestamp":"2026-02-11T08:59:44Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/cloud_platform_service/google_project_default_service_accounts/action/.terraform.lock.hcl b/inputs/gcp/cloud_platform_service/google_project_default_service_accounts/action/.terraform.lock.hcl index 6c2d3da9f..2d35c134a 100644 --- a/inputs/gcp/cloud_platform_service/google_project_default_service_accounts/action/.terraform.lock.hcl +++ b/inputs/gcp/cloud_platform_service/google_project_default_service_accounts/action/.terraform.lock.hcl @@ -2,20 +2,20 @@ # Manual edits may be lost in future updates. provider "registry.terraform.io/hashicorp/google" { - version = "7.1.1" + version = "7.19.0" hashes = [ - "h1:Hu/Gy8dB7TXsUyswqm6XJhr7esYmXk9Ea/Jo9VgT4LE=", - "zh:03ee9fdc0d157a606aba68658de6dc809fc3335cccb7c537373d8643412c1327", - "zh:110e8ffe81deb8c203ecf310a15c2dedca1dfc936473a247b8a4f98adebd86f5", - "zh:459e3419c004e7a475fb60cc52d47a34b3dc4e4de905eaa8e8f78ddbe550a9b5", - "zh:466cd31cee36877bc18aeabed80d1f4a22bac4e59a460be6e8bdb72dedca0e2b", - "zh:51d707eb2d854fa16dcbe21e29b01534eb893a2152a219ea84a15bbd87a4ff64", - "zh:69d6a1c83ffddd7f81273a98fb0ff7c13985a3c876565dd3df76c730c9929871", - "zh:9b5050da221735c7e8f75ed00d25578afaf8ed94a8c2f1f58f471eee98105d10", - "zh:ab01f2fd961ee86d99a55186093620d29f5323c0cd5613284d484e333679d70b", - "zh:d0f5b15774b15991baf71eb4a55a6831e3fb4b603f589f80b03393b46a9657a4", - "zh:dc198ec4b42435321f4fa12ca8d713cd350ff2f82d8749b87785b91b15b7c3ed", - "zh:e949c00ce89c92b7ed16cc0b0aed8e80d6416b240dc02047f9fa1de49aa4c44e", + "h1:8lfoMp5YTC0pDT5da1fOJNnEaCm8JWClTo51g9ceipE=", + "zh:06da157d858384b2383414447c1bf6cf319ad72ea87d7030c6ca18b9bb774f73", + "zh:2f1d7c3461a6b59ffcf0eed2f3764e2f0a2c70464927e561d968d82112e3600d", + "zh:4705ce487e6b2c52376e1f9bc0dc650e8326ab3e20d0673c9fed62e1313d2d67", + "zh:5cd9a4ee36d3d7ffbabb90c83cb7cce54cf0f10c912db4be7492ebc1a78611b3", + "zh:688622dbac98fe95115518ff3d9324cf71ffdf124ca6e66b2269f43d9f8e7ceb", + "zh:7a5c07ae0728c7a57a63d848411c91550fd3bfe662f60821b50d3370be360134", + "zh:8a6472dec8082d7225a811c8ee0bf550c7a9c36e86cfd19b10363106f2dfbb80", + "zh:8e11d4c27e70500aaa1335cb721ad64c4b0e41b3c7398d6fe58a3d92f10ea213", + "zh:9a119c27e27bad73cdd8c0544f8a68a84bdac3de0129f13a87a6890ed19c6035", + "zh:dd12460d2b8b4497b5a7c46bb486ace9859d2fc642782989df315e618596d1e4", "zh:f569b65999264a9416862bca5cd2a6177d94ccb0424f3a4ef424428912b9cb3c", + "zh:fc35c660777b377978e5f2d008db6181ff2f98777cdd215effc11d665e99e0bc", ] } diff --git a/inputs/gcp/cloud_platform_service/google_project_default_service_accounts/action/plan.json b/inputs/gcp/cloud_platform_service/google_project_default_service_accounts/action/plan.json new file mode 100644 index 000000000..f3a0396db --- /dev/null +++ b/inputs/gcp/cloud_platform_service/google_project_default_service_accounts/action/plan.json @@ -0,0 +1 @@ +{"format_version":"1.2","terraform_version":"1.13.3","planned_values":{"root_module":{"resources":[{"address":"google_project_default_service_accounts.c1","mode":"managed","type":"google_project_default_service_accounts","name":"c1","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"action":"DEPRIVILEGE","project":"proj-security-prod","restore_policy":"REVERT","timeouts":null},"sensitive_values":{"service_accounts":{}}},{"address":"google_project_default_service_accounts.nc1","mode":"managed","type":"google_project_default_service_accounts","name":"nc1","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"action":"DELETE","project":"proj-app-test","restore_policy":"REVERT","timeouts":null},"sensitive_values":{"service_accounts":{}}},{"address":"google_project_default_service_accounts.nc2","mode":"managed","type":"google_project_default_service_accounts","name":"nc2","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"action":"DISABLE","project":"proj-app-test","restore_policy":"REVERT_AND_IGNORE_FAILURE","timeouts":null},"sensitive_values":{"service_accounts":{}}}]}},"resource_changes":[{"address":"google_project_default_service_accounts.c1","mode":"managed","type":"google_project_default_service_accounts","name":"c1","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"action":"DEPRIVILEGE","project":"proj-security-prod","restore_policy":"REVERT","timeouts":null},"after_unknown":{"id":true,"service_accounts":true},"before_sensitive":false,"after_sensitive":{"service_accounts":{}}}},{"address":"google_project_default_service_accounts.nc1","mode":"managed","type":"google_project_default_service_accounts","name":"nc1","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"action":"DELETE","project":"proj-app-test","restore_policy":"REVERT","timeouts":null},"after_unknown":{"id":true,"service_accounts":true},"before_sensitive":false,"after_sensitive":{"service_accounts":{}}}},{"address":"google_project_default_service_accounts.nc2","mode":"managed","type":"google_project_default_service_accounts","name":"nc2","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"action":"DISABLE","project":"proj-app-test","restore_policy":"REVERT_AND_IGNORE_FAILURE","timeouts":null},"after_unknown":{"id":true,"service_accounts":true},"before_sensitive":false,"after_sensitive":{"service_accounts":{}}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_project_default_service_accounts.c1","mode":"managed","type":"google_project_default_service_accounts","name":"c1","provider_config_key":"google","expressions":{"action":{"constant_value":"DEPRIVILEGE"},"project":{"constant_value":"proj-security-prod"},"restore_policy":{"constant_value":"REVERT"}},"schema_version":0},{"address":"google_project_default_service_accounts.nc1","mode":"managed","type":"google_project_default_service_accounts","name":"nc1","provider_config_key":"google","expressions":{"action":{"constant_value":"DELETE"},"project":{"constant_value":"proj-app-test"},"restore_policy":{"constant_value":"REVERT"}},"schema_version":0},{"address":"google_project_default_service_accounts.nc2","mode":"managed","type":"google_project_default_service_accounts","name":"nc2","provider_config_key":"google","expressions":{"action":{"constant_value":"DISABLE"},"project":{"constant_value":"proj-app-test"},"restore_policy":{"constant_value":"REVERT_AND_IGNORE_FAILURE"}},"schema_version":0}]}},"timestamp":"2026-02-11T08:59:44Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/cloud_platform_service/google_project_service/service/.terraform.lock.hcl b/inputs/gcp/cloud_platform_service/google_project_service/service/.terraform.lock.hcl index 6c2d3da9f..2d35c134a 100644 --- a/inputs/gcp/cloud_platform_service/google_project_service/service/.terraform.lock.hcl +++ b/inputs/gcp/cloud_platform_service/google_project_service/service/.terraform.lock.hcl @@ -2,20 +2,20 @@ # Manual edits may be lost in future updates. provider "registry.terraform.io/hashicorp/google" { - version = "7.1.1" + version = "7.19.0" hashes = [ - "h1:Hu/Gy8dB7TXsUyswqm6XJhr7esYmXk9Ea/Jo9VgT4LE=", - "zh:03ee9fdc0d157a606aba68658de6dc809fc3335cccb7c537373d8643412c1327", - "zh:110e8ffe81deb8c203ecf310a15c2dedca1dfc936473a247b8a4f98adebd86f5", - "zh:459e3419c004e7a475fb60cc52d47a34b3dc4e4de905eaa8e8f78ddbe550a9b5", - "zh:466cd31cee36877bc18aeabed80d1f4a22bac4e59a460be6e8bdb72dedca0e2b", - "zh:51d707eb2d854fa16dcbe21e29b01534eb893a2152a219ea84a15bbd87a4ff64", - "zh:69d6a1c83ffddd7f81273a98fb0ff7c13985a3c876565dd3df76c730c9929871", - "zh:9b5050da221735c7e8f75ed00d25578afaf8ed94a8c2f1f58f471eee98105d10", - "zh:ab01f2fd961ee86d99a55186093620d29f5323c0cd5613284d484e333679d70b", - "zh:d0f5b15774b15991baf71eb4a55a6831e3fb4b603f589f80b03393b46a9657a4", - "zh:dc198ec4b42435321f4fa12ca8d713cd350ff2f82d8749b87785b91b15b7c3ed", - "zh:e949c00ce89c92b7ed16cc0b0aed8e80d6416b240dc02047f9fa1de49aa4c44e", + "h1:8lfoMp5YTC0pDT5da1fOJNnEaCm8JWClTo51g9ceipE=", + "zh:06da157d858384b2383414447c1bf6cf319ad72ea87d7030c6ca18b9bb774f73", + "zh:2f1d7c3461a6b59ffcf0eed2f3764e2f0a2c70464927e561d968d82112e3600d", + "zh:4705ce487e6b2c52376e1f9bc0dc650e8326ab3e20d0673c9fed62e1313d2d67", + "zh:5cd9a4ee36d3d7ffbabb90c83cb7cce54cf0f10c912db4be7492ebc1a78611b3", + "zh:688622dbac98fe95115518ff3d9324cf71ffdf124ca6e66b2269f43d9f8e7ceb", + "zh:7a5c07ae0728c7a57a63d848411c91550fd3bfe662f60821b50d3370be360134", + "zh:8a6472dec8082d7225a811c8ee0bf550c7a9c36e86cfd19b10363106f2dfbb80", + "zh:8e11d4c27e70500aaa1335cb721ad64c4b0e41b3c7398d6fe58a3d92f10ea213", + "zh:9a119c27e27bad73cdd8c0544f8a68a84bdac3de0129f13a87a6890ed19c6035", + "zh:dd12460d2b8b4497b5a7c46bb486ace9859d2fc642782989df315e618596d1e4", "zh:f569b65999264a9416862bca5cd2a6177d94ccb0424f3a4ef424428912b9cb3c", + "zh:fc35c660777b377978e5f2d008db6181ff2f98777cdd215effc11d665e99e0bc", ] } diff --git a/inputs/gcp/cloud_platform_service/google_project_service/service/plan.json b/inputs/gcp/cloud_platform_service/google_project_service/service/plan.json new file mode 100644 index 000000000..28767e9dc --- /dev/null +++ b/inputs/gcp/cloud_platform_service/google_project_service/service/plan.json @@ -0,0 +1 @@ +{"format_version":"1.2","terraform_version":"1.13.3","planned_values":{"root_module":{"resources":[{"address":"google_project_service.c","mode":"managed","type":"google_project_service","name":"c","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"disable_dependent_services":null,"disable_on_destroy":null,"project":"secure-project","service":"iam.googleapis.com","timeouts":null},"sensitive_values":{}},{"address":"google_project_service.nc","mode":"managed","type":"google_project_service","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"disable_dependent_services":null,"disable_on_destroy":null,"project":"noncompliant-project","service":"storage.googleapis.com","timeouts":null},"sensitive_values":{}}]}},"resource_changes":[{"address":"google_project_service.c","mode":"managed","type":"google_project_service","name":"c","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"disable_dependent_services":null,"disable_on_destroy":null,"project":"secure-project","service":"iam.googleapis.com","timeouts":null},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"google_project_service.nc","mode":"managed","type":"google_project_service","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"disable_dependent_services":null,"disable_on_destroy":null,"project":"noncompliant-project","service":"storage.googleapis.com","timeouts":null},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_project_service.c","mode":"managed","type":"google_project_service","name":"c","provider_config_key":"google","expressions":{"project":{"constant_value":"secure-project"},"service":{"constant_value":"iam.googleapis.com"}},"schema_version":0},{"address":"google_project_service.nc","mode":"managed","type":"google_project_service","name":"nc","provider_config_key":"google","expressions":{"project":{"constant_value":"noncompliant-project"},"service":{"constant_value":"storage.googleapis.com"}},"schema_version":0}]}},"timestamp":"2026-02-11T08:59:45Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/cloud_platform_service/google_service_account/account_id/.terraform.lock.hcl b/inputs/gcp/cloud_platform_service/google_service_account/account_id/.terraform.lock.hcl index 6c2d3da9f..2d35c134a 100644 --- a/inputs/gcp/cloud_platform_service/google_service_account/account_id/.terraform.lock.hcl +++ b/inputs/gcp/cloud_platform_service/google_service_account/account_id/.terraform.lock.hcl @@ -2,20 +2,20 @@ # Manual edits may be lost in future updates. provider "registry.terraform.io/hashicorp/google" { - version = "7.1.1" + version = "7.19.0" hashes = [ - "h1:Hu/Gy8dB7TXsUyswqm6XJhr7esYmXk9Ea/Jo9VgT4LE=", - "zh:03ee9fdc0d157a606aba68658de6dc809fc3335cccb7c537373d8643412c1327", - "zh:110e8ffe81deb8c203ecf310a15c2dedca1dfc936473a247b8a4f98adebd86f5", - "zh:459e3419c004e7a475fb60cc52d47a34b3dc4e4de905eaa8e8f78ddbe550a9b5", - "zh:466cd31cee36877bc18aeabed80d1f4a22bac4e59a460be6e8bdb72dedca0e2b", - "zh:51d707eb2d854fa16dcbe21e29b01534eb893a2152a219ea84a15bbd87a4ff64", - "zh:69d6a1c83ffddd7f81273a98fb0ff7c13985a3c876565dd3df76c730c9929871", - "zh:9b5050da221735c7e8f75ed00d25578afaf8ed94a8c2f1f58f471eee98105d10", - "zh:ab01f2fd961ee86d99a55186093620d29f5323c0cd5613284d484e333679d70b", - "zh:d0f5b15774b15991baf71eb4a55a6831e3fb4b603f589f80b03393b46a9657a4", - "zh:dc198ec4b42435321f4fa12ca8d713cd350ff2f82d8749b87785b91b15b7c3ed", - "zh:e949c00ce89c92b7ed16cc0b0aed8e80d6416b240dc02047f9fa1de49aa4c44e", + "h1:8lfoMp5YTC0pDT5da1fOJNnEaCm8JWClTo51g9ceipE=", + "zh:06da157d858384b2383414447c1bf6cf319ad72ea87d7030c6ca18b9bb774f73", + "zh:2f1d7c3461a6b59ffcf0eed2f3764e2f0a2c70464927e561d968d82112e3600d", + "zh:4705ce487e6b2c52376e1f9bc0dc650e8326ab3e20d0673c9fed62e1313d2d67", + "zh:5cd9a4ee36d3d7ffbabb90c83cb7cce54cf0f10c912db4be7492ebc1a78611b3", + "zh:688622dbac98fe95115518ff3d9324cf71ffdf124ca6e66b2269f43d9f8e7ceb", + "zh:7a5c07ae0728c7a57a63d848411c91550fd3bfe662f60821b50d3370be360134", + "zh:8a6472dec8082d7225a811c8ee0bf550c7a9c36e86cfd19b10363106f2dfbb80", + "zh:8e11d4c27e70500aaa1335cb721ad64c4b0e41b3c7398d6fe58a3d92f10ea213", + "zh:9a119c27e27bad73cdd8c0544f8a68a84bdac3de0129f13a87a6890ed19c6035", + "zh:dd12460d2b8b4497b5a7c46bb486ace9859d2fc642782989df315e618596d1e4", "zh:f569b65999264a9416862bca5cd2a6177d94ccb0424f3a4ef424428912b9cb3c", + "zh:fc35c660777b377978e5f2d008db6181ff2f98777cdd215effc11d665e99e0bc", ] } diff --git a/inputs/gcp/cloud_platform_service/google_service_account/account_id/plan.json b/inputs/gcp/cloud_platform_service/google_service_account/account_id/plan.json new file mode 100644 index 000000000..ca2ffcfb3 --- /dev/null +++ b/inputs/gcp/cloud_platform_service/google_service_account/account_id/plan.json @@ -0,0 +1 @@ +{"format_version":"1.2","terraform_version":"1.13.3","planned_values":{"root_module":{"resources":[{"address":"google_service_account.c","mode":"managed","type":"google_service_account","name":"c","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"account_id":"payments-batcher-prod","create_ignore_already_exists":null,"description":"Batches payments","disabled":false,"display_name":"Payments Batch Processor","email":"payments-batcher-prod@my-secure-project.iam.gserviceaccount.com","member":"serviceAccount:payments-batcher-prod@my-secure-project.iam.gserviceaccount.com","project":"my-secure-project","timeouts":null},"sensitive_values":{}},{"address":"google_service_account.nc","mode":"managed","type":"google_service_account","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"account_id":"administration","create_ignore_already_exists":null,"description":"Ops automation agent","disabled":false,"display_name":"Ops Agent","email":"administration@not-secure-project.iam.gserviceaccount.com","member":"serviceAccount:administration@not-secure-project.iam.gserviceaccount.com","project":"not-secure-project","timeouts":null},"sensitive_values":{}}]}},"resource_changes":[{"address":"google_service_account.c","mode":"managed","type":"google_service_account","name":"c","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"account_id":"payments-batcher-prod","create_ignore_already_exists":null,"description":"Batches payments","disabled":false,"display_name":"Payments Batch Processor","email":"payments-batcher-prod@my-secure-project.iam.gserviceaccount.com","member":"serviceAccount:payments-batcher-prod@my-secure-project.iam.gserviceaccount.com","project":"my-secure-project","timeouts":null},"after_unknown":{"id":true,"name":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"google_service_account.nc","mode":"managed","type":"google_service_account","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"account_id":"administration","create_ignore_already_exists":null,"description":"Ops automation agent","disabled":false,"display_name":"Ops Agent","email":"administration@not-secure-project.iam.gserviceaccount.com","member":"serviceAccount:administration@not-secure-project.iam.gserviceaccount.com","project":"not-secure-project","timeouts":null},"after_unknown":{"id":true,"name":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_service_account.c","mode":"managed","type":"google_service_account","name":"c","provider_config_key":"google","expressions":{"account_id":{"constant_value":"payments-batcher-prod"},"description":{"constant_value":"Batches payments"},"disabled":{"constant_value":false},"display_name":{"constant_value":"Payments Batch Processor"},"project":{"constant_value":"my-secure-project"}},"schema_version":0},{"address":"google_service_account.nc","mode":"managed","type":"google_service_account","name":"nc","provider_config_key":"google","expressions":{"account_id":{"constant_value":"administration"},"description":{"constant_value":"Ops automation agent"},"disabled":{"constant_value":false},"display_name":{"constant_value":"Ops Agent"},"project":{"constant_value":"not-secure-project"}},"schema_version":0}]}},"timestamp":"2026-02-11T08:59:50Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/cloud_platform_service/google_service_account/description/.terraform.lock.hcl b/inputs/gcp/cloud_platform_service/google_service_account/description/.terraform.lock.hcl index 6c2d3da9f..2d35c134a 100644 --- a/inputs/gcp/cloud_platform_service/google_service_account/description/.terraform.lock.hcl +++ b/inputs/gcp/cloud_platform_service/google_service_account/description/.terraform.lock.hcl @@ -2,20 +2,20 @@ # Manual edits may be lost in future updates. provider "registry.terraform.io/hashicorp/google" { - version = "7.1.1" + version = "7.19.0" hashes = [ - "h1:Hu/Gy8dB7TXsUyswqm6XJhr7esYmXk9Ea/Jo9VgT4LE=", - "zh:03ee9fdc0d157a606aba68658de6dc809fc3335cccb7c537373d8643412c1327", - "zh:110e8ffe81deb8c203ecf310a15c2dedca1dfc936473a247b8a4f98adebd86f5", - "zh:459e3419c004e7a475fb60cc52d47a34b3dc4e4de905eaa8e8f78ddbe550a9b5", - "zh:466cd31cee36877bc18aeabed80d1f4a22bac4e59a460be6e8bdb72dedca0e2b", - "zh:51d707eb2d854fa16dcbe21e29b01534eb893a2152a219ea84a15bbd87a4ff64", - "zh:69d6a1c83ffddd7f81273a98fb0ff7c13985a3c876565dd3df76c730c9929871", - "zh:9b5050da221735c7e8f75ed00d25578afaf8ed94a8c2f1f58f471eee98105d10", - "zh:ab01f2fd961ee86d99a55186093620d29f5323c0cd5613284d484e333679d70b", - "zh:d0f5b15774b15991baf71eb4a55a6831e3fb4b603f589f80b03393b46a9657a4", - "zh:dc198ec4b42435321f4fa12ca8d713cd350ff2f82d8749b87785b91b15b7c3ed", - "zh:e949c00ce89c92b7ed16cc0b0aed8e80d6416b240dc02047f9fa1de49aa4c44e", + "h1:8lfoMp5YTC0pDT5da1fOJNnEaCm8JWClTo51g9ceipE=", + "zh:06da157d858384b2383414447c1bf6cf319ad72ea87d7030c6ca18b9bb774f73", + "zh:2f1d7c3461a6b59ffcf0eed2f3764e2f0a2c70464927e561d968d82112e3600d", + "zh:4705ce487e6b2c52376e1f9bc0dc650e8326ab3e20d0673c9fed62e1313d2d67", + "zh:5cd9a4ee36d3d7ffbabb90c83cb7cce54cf0f10c912db4be7492ebc1a78611b3", + "zh:688622dbac98fe95115518ff3d9324cf71ffdf124ca6e66b2269f43d9f8e7ceb", + "zh:7a5c07ae0728c7a57a63d848411c91550fd3bfe662f60821b50d3370be360134", + "zh:8a6472dec8082d7225a811c8ee0bf550c7a9c36e86cfd19b10363106f2dfbb80", + "zh:8e11d4c27e70500aaa1335cb721ad64c4b0e41b3c7398d6fe58a3d92f10ea213", + "zh:9a119c27e27bad73cdd8c0544f8a68a84bdac3de0129f13a87a6890ed19c6035", + "zh:dd12460d2b8b4497b5a7c46bb486ace9859d2fc642782989df315e618596d1e4", "zh:f569b65999264a9416862bca5cd2a6177d94ccb0424f3a4ef424428912b9cb3c", + "zh:fc35c660777b377978e5f2d008db6181ff2f98777cdd215effc11d665e99e0bc", ] } diff --git a/inputs/gcp/cloud_platform_service/google_service_account/description/plan.json b/inputs/gcp/cloud_platform_service/google_service_account/description/plan.json new file mode 100644 index 000000000..c1f1a76a2 --- /dev/null +++ b/inputs/gcp/cloud_platform_service/google_service_account/description/plan.json @@ -0,0 +1 @@ +{"format_version":"1.2","terraform_version":"1.13.3","planned_values":{"root_module":{"resources":[{"address":"google_service_account.c","mode":"managed","type":"google_service_account","name":"c","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"account_id":"etl-runner-prod","create_ignore_already_exists":null,"description":"Runs nightly ETL for analytics","disabled":false,"display_name":"ETL Runner","email":"etl-runner-prod@my-secure-project.iam.gserviceaccount.com","member":"serviceAccount:etl-runner-prod@my-secure-project.iam.gserviceaccount.com","project":"my-secure-project","timeouts":null},"sensitive_values":{}},{"address":"google_service_account.nc","mode":"managed","type":"google_service_account","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"account_id":"etl-runner-prod","create_ignore_already_exists":null,"description":"","disabled":false,"display_name":"ETL Runner","email":"etl-runner-prod@not-secure-project.iam.gserviceaccount.com","member":"serviceAccount:etl-runner-prod@not-secure-project.iam.gserviceaccount.com","project":"not-secure-project","timeouts":null},"sensitive_values":{}}]}},"resource_changes":[{"address":"google_service_account.c","mode":"managed","type":"google_service_account","name":"c","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"account_id":"etl-runner-prod","create_ignore_already_exists":null,"description":"Runs nightly ETL for analytics","disabled":false,"display_name":"ETL Runner","email":"etl-runner-prod@my-secure-project.iam.gserviceaccount.com","member":"serviceAccount:etl-runner-prod@my-secure-project.iam.gserviceaccount.com","project":"my-secure-project","timeouts":null},"after_unknown":{"id":true,"name":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"google_service_account.nc","mode":"managed","type":"google_service_account","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"account_id":"etl-runner-prod","create_ignore_already_exists":null,"description":"","disabled":false,"display_name":"ETL Runner","email":"etl-runner-prod@not-secure-project.iam.gserviceaccount.com","member":"serviceAccount:etl-runner-prod@not-secure-project.iam.gserviceaccount.com","project":"not-secure-project","timeouts":null},"after_unknown":{"id":true,"name":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_service_account.c","mode":"managed","type":"google_service_account","name":"c","provider_config_key":"google","expressions":{"account_id":{"constant_value":"etl-runner-prod"},"description":{"constant_value":"Runs nightly ETL for analytics"},"disabled":{"constant_value":false},"display_name":{"constant_value":"ETL Runner"},"project":{"constant_value":"my-secure-project"}},"schema_version":0},{"address":"google_service_account.nc","mode":"managed","type":"google_service_account","name":"nc","provider_config_key":"google","expressions":{"account_id":{"constant_value":"etl-runner-prod"},"description":{"constant_value":""},"disabled":{"constant_value":false},"display_name":{"constant_value":"ETL Runner"},"project":{"constant_value":"not-secure-project"}},"schema_version":0}]}},"timestamp":"2026-02-11T08:59:50Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/cloud_platform_service/google_service_account/disabled/.terraform.lock.hcl b/inputs/gcp/cloud_platform_service/google_service_account/disabled/.terraform.lock.hcl index 6c2d3da9f..2d35c134a 100644 --- a/inputs/gcp/cloud_platform_service/google_service_account/disabled/.terraform.lock.hcl +++ b/inputs/gcp/cloud_platform_service/google_service_account/disabled/.terraform.lock.hcl @@ -2,20 +2,20 @@ # Manual edits may be lost in future updates. provider "registry.terraform.io/hashicorp/google" { - version = "7.1.1" + version = "7.19.0" hashes = [ - "h1:Hu/Gy8dB7TXsUyswqm6XJhr7esYmXk9Ea/Jo9VgT4LE=", - "zh:03ee9fdc0d157a606aba68658de6dc809fc3335cccb7c537373d8643412c1327", - "zh:110e8ffe81deb8c203ecf310a15c2dedca1dfc936473a247b8a4f98adebd86f5", - "zh:459e3419c004e7a475fb60cc52d47a34b3dc4e4de905eaa8e8f78ddbe550a9b5", - "zh:466cd31cee36877bc18aeabed80d1f4a22bac4e59a460be6e8bdb72dedca0e2b", - "zh:51d707eb2d854fa16dcbe21e29b01534eb893a2152a219ea84a15bbd87a4ff64", - "zh:69d6a1c83ffddd7f81273a98fb0ff7c13985a3c876565dd3df76c730c9929871", - "zh:9b5050da221735c7e8f75ed00d25578afaf8ed94a8c2f1f58f471eee98105d10", - "zh:ab01f2fd961ee86d99a55186093620d29f5323c0cd5613284d484e333679d70b", - "zh:d0f5b15774b15991baf71eb4a55a6831e3fb4b603f589f80b03393b46a9657a4", - "zh:dc198ec4b42435321f4fa12ca8d713cd350ff2f82d8749b87785b91b15b7c3ed", - "zh:e949c00ce89c92b7ed16cc0b0aed8e80d6416b240dc02047f9fa1de49aa4c44e", + "h1:8lfoMp5YTC0pDT5da1fOJNnEaCm8JWClTo51g9ceipE=", + "zh:06da157d858384b2383414447c1bf6cf319ad72ea87d7030c6ca18b9bb774f73", + "zh:2f1d7c3461a6b59ffcf0eed2f3764e2f0a2c70464927e561d968d82112e3600d", + "zh:4705ce487e6b2c52376e1f9bc0dc650e8326ab3e20d0673c9fed62e1313d2d67", + "zh:5cd9a4ee36d3d7ffbabb90c83cb7cce54cf0f10c912db4be7492ebc1a78611b3", + "zh:688622dbac98fe95115518ff3d9324cf71ffdf124ca6e66b2269f43d9f8e7ceb", + "zh:7a5c07ae0728c7a57a63d848411c91550fd3bfe662f60821b50d3370be360134", + "zh:8a6472dec8082d7225a811c8ee0bf550c7a9c36e86cfd19b10363106f2dfbb80", + "zh:8e11d4c27e70500aaa1335cb721ad64c4b0e41b3c7398d6fe58a3d92f10ea213", + "zh:9a119c27e27bad73cdd8c0544f8a68a84bdac3de0129f13a87a6890ed19c6035", + "zh:dd12460d2b8b4497b5a7c46bb486ace9859d2fc642782989df315e618596d1e4", "zh:f569b65999264a9416862bca5cd2a6177d94ccb0424f3a4ef424428912b9cb3c", + "zh:fc35c660777b377978e5f2d008db6181ff2f98777cdd215effc11d665e99e0bc", ] } diff --git a/inputs/gcp/cloud_platform_service/google_service_account/disabled/plan.json b/inputs/gcp/cloud_platform_service/google_service_account/disabled/plan.json new file mode 100644 index 000000000..5e08de396 --- /dev/null +++ b/inputs/gcp/cloud_platform_service/google_service_account/disabled/plan.json @@ -0,0 +1 @@ +{"format_version":"1.2","terraform_version":"1.13.3","planned_values":{"root_module":{"resources":[{"address":"google_service_account.c","mode":"managed","type":"google_service_account","name":"c","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"account_id":"notifier-prod","create_ignore_already_exists":null,"description":"Sends notifications","disabled":false,"display_name":"Notifier","email":"notifier-prod@my-secure-project.iam.gserviceaccount.com","member":"serviceAccount:notifier-prod@my-secure-project.iam.gserviceaccount.com","project":"my-secure-project","timeouts":null},"sensitive_values":{}},{"address":"google_service_account.nc","mode":"managed","type":"google_service_account","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"account_id":"notifier-staging","create_ignore_already_exists":null,"description":"Staging notifier service account","disabled":true,"display_name":"Notifier staging","email":"notifier-staging@not-secure-project.iam.gserviceaccount.com","member":"serviceAccount:notifier-staging@not-secure-project.iam.gserviceaccount.com","project":"not-secure-project","timeouts":null},"sensitive_values":{}}]}},"resource_changes":[{"address":"google_service_account.c","mode":"managed","type":"google_service_account","name":"c","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"account_id":"notifier-prod","create_ignore_already_exists":null,"description":"Sends notifications","disabled":false,"display_name":"Notifier","email":"notifier-prod@my-secure-project.iam.gserviceaccount.com","member":"serviceAccount:notifier-prod@my-secure-project.iam.gserviceaccount.com","project":"my-secure-project","timeouts":null},"after_unknown":{"id":true,"name":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"google_service_account.nc","mode":"managed","type":"google_service_account","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"account_id":"notifier-staging","create_ignore_already_exists":null,"description":"Staging notifier service account","disabled":true,"display_name":"Notifier staging","email":"notifier-staging@not-secure-project.iam.gserviceaccount.com","member":"serviceAccount:notifier-staging@not-secure-project.iam.gserviceaccount.com","project":"not-secure-project","timeouts":null},"after_unknown":{"id":true,"name":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_service_account.c","mode":"managed","type":"google_service_account","name":"c","provider_config_key":"google","expressions":{"account_id":{"constant_value":"notifier-prod"},"description":{"constant_value":"Sends notifications"},"disabled":{"constant_value":false},"display_name":{"constant_value":"Notifier"},"project":{"constant_value":"my-secure-project"}},"schema_version":0},{"address":"google_service_account.nc","mode":"managed","type":"google_service_account","name":"nc","provider_config_key":"google","expressions":{"account_id":{"constant_value":"notifier-staging"},"description":{"constant_value":"Staging notifier service account"},"disabled":{"constant_value":true},"display_name":{"constant_value":"Notifier staging"},"project":{"constant_value":"not-secure-project"}},"schema_version":0}]}},"timestamp":"2026-02-11T08:59:50Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/cloud_platform_service/google_service_account/display_name/.terraform.lock.hcl b/inputs/gcp/cloud_platform_service/google_service_account/display_name/.terraform.lock.hcl index 6c2d3da9f..2d35c134a 100644 --- a/inputs/gcp/cloud_platform_service/google_service_account/display_name/.terraform.lock.hcl +++ b/inputs/gcp/cloud_platform_service/google_service_account/display_name/.terraform.lock.hcl @@ -2,20 +2,20 @@ # Manual edits may be lost in future updates. provider "registry.terraform.io/hashicorp/google" { - version = "7.1.1" + version = "7.19.0" hashes = [ - "h1:Hu/Gy8dB7TXsUyswqm6XJhr7esYmXk9Ea/Jo9VgT4LE=", - "zh:03ee9fdc0d157a606aba68658de6dc809fc3335cccb7c537373d8643412c1327", - "zh:110e8ffe81deb8c203ecf310a15c2dedca1dfc936473a247b8a4f98adebd86f5", - "zh:459e3419c004e7a475fb60cc52d47a34b3dc4e4de905eaa8e8f78ddbe550a9b5", - "zh:466cd31cee36877bc18aeabed80d1f4a22bac4e59a460be6e8bdb72dedca0e2b", - "zh:51d707eb2d854fa16dcbe21e29b01534eb893a2152a219ea84a15bbd87a4ff64", - "zh:69d6a1c83ffddd7f81273a98fb0ff7c13985a3c876565dd3df76c730c9929871", - "zh:9b5050da221735c7e8f75ed00d25578afaf8ed94a8c2f1f58f471eee98105d10", - "zh:ab01f2fd961ee86d99a55186093620d29f5323c0cd5613284d484e333679d70b", - "zh:d0f5b15774b15991baf71eb4a55a6831e3fb4b603f589f80b03393b46a9657a4", - "zh:dc198ec4b42435321f4fa12ca8d713cd350ff2f82d8749b87785b91b15b7c3ed", - "zh:e949c00ce89c92b7ed16cc0b0aed8e80d6416b240dc02047f9fa1de49aa4c44e", + "h1:8lfoMp5YTC0pDT5da1fOJNnEaCm8JWClTo51g9ceipE=", + "zh:06da157d858384b2383414447c1bf6cf319ad72ea87d7030c6ca18b9bb774f73", + "zh:2f1d7c3461a6b59ffcf0eed2f3764e2f0a2c70464927e561d968d82112e3600d", + "zh:4705ce487e6b2c52376e1f9bc0dc650e8326ab3e20d0673c9fed62e1313d2d67", + "zh:5cd9a4ee36d3d7ffbabb90c83cb7cce54cf0f10c912db4be7492ebc1a78611b3", + "zh:688622dbac98fe95115518ff3d9324cf71ffdf124ca6e66b2269f43d9f8e7ceb", + "zh:7a5c07ae0728c7a57a63d848411c91550fd3bfe662f60821b50d3370be360134", + "zh:8a6472dec8082d7225a811c8ee0bf550c7a9c36e86cfd19b10363106f2dfbb80", + "zh:8e11d4c27e70500aaa1335cb721ad64c4b0e41b3c7398d6fe58a3d92f10ea213", + "zh:9a119c27e27bad73cdd8c0544f8a68a84bdac3de0129f13a87a6890ed19c6035", + "zh:dd12460d2b8b4497b5a7c46bb486ace9859d2fc642782989df315e618596d1e4", "zh:f569b65999264a9416862bca5cd2a6177d94ccb0424f3a4ef424428912b9cb3c", + "zh:fc35c660777b377978e5f2d008db6181ff2f98777cdd215effc11d665e99e0bc", ] } diff --git a/inputs/gcp/cloud_platform_service/google_service_account/display_name/plan.json b/inputs/gcp/cloud_platform_service/google_service_account/display_name/plan.json new file mode 100644 index 000000000..a9bcc8f2a --- /dev/null +++ b/inputs/gcp/cloud_platform_service/google_service_account/display_name/plan.json @@ -0,0 +1 @@ +{"format_version":"1.2","terraform_version":"1.13.3","planned_values":{"root_module":{"resources":[{"address":"google_service_account.c","mode":"managed","type":"google_service_account","name":"c","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"account_id":"reporting-agent-prod","create_ignore_already_exists":null,"description":"Generates daily reports","disabled":false,"display_name":"Reporting Agent","email":"reporting-agent-prod@my-secure-project.iam.gserviceaccount.com","member":"serviceAccount:reporting-agent-prod@my-secure-project.iam.gserviceaccount.com","project":"my-secure-project","timeouts":null},"sensitive_values":{}},{"address":"google_service_account.nc","mode":"managed","type":"google_service_account","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"account_id":"reporting-agent-staging","create_ignore_already_exists":null,"description":"Generates daily reports","disabled":false,"display_name":"root-service","email":"reporting-agent-staging@not-secure-project.iam.gserviceaccount.com","member":"serviceAccount:reporting-agent-staging@not-secure-project.iam.gserviceaccount.com","project":"not-secure-project","timeouts":null},"sensitive_values":{}}]}},"resource_changes":[{"address":"google_service_account.c","mode":"managed","type":"google_service_account","name":"c","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"account_id":"reporting-agent-prod","create_ignore_already_exists":null,"description":"Generates daily reports","disabled":false,"display_name":"Reporting Agent","email":"reporting-agent-prod@my-secure-project.iam.gserviceaccount.com","member":"serviceAccount:reporting-agent-prod@my-secure-project.iam.gserviceaccount.com","project":"my-secure-project","timeouts":null},"after_unknown":{"id":true,"name":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"google_service_account.nc","mode":"managed","type":"google_service_account","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"account_id":"reporting-agent-staging","create_ignore_already_exists":null,"description":"Generates daily reports","disabled":false,"display_name":"root-service","email":"reporting-agent-staging@not-secure-project.iam.gserviceaccount.com","member":"serviceAccount:reporting-agent-staging@not-secure-project.iam.gserviceaccount.com","project":"not-secure-project","timeouts":null},"after_unknown":{"id":true,"name":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_service_account.c","mode":"managed","type":"google_service_account","name":"c","provider_config_key":"google","expressions":{"account_id":{"constant_value":"reporting-agent-prod"},"description":{"constant_value":"Generates daily reports"},"disabled":{"constant_value":false},"display_name":{"constant_value":"Reporting Agent"},"project":{"constant_value":"my-secure-project"}},"schema_version":0},{"address":"google_service_account.nc","mode":"managed","type":"google_service_account","name":"nc","provider_config_key":"google","expressions":{"account_id":{"constant_value":"reporting-agent-staging"},"description":{"constant_value":"Generates daily reports"},"disabled":{"constant_value":false},"display_name":{"constant_value":"root-service"},"project":{"constant_value":"not-secure-project"}},"schema_version":0}]}},"timestamp":"2026-02-11T08:59:50Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/cloud_platform_service/google_service_account_key/exposure/.terraform.lock.hcl b/inputs/gcp/cloud_platform_service/google_service_account_key/exposure/.terraform.lock.hcl index f87368416..e4ad326dc 100644 --- a/inputs/gcp/cloud_platform_service/google_service_account_key/exposure/.terraform.lock.hcl +++ b/inputs/gcp/cloud_platform_service/google_service_account_key/exposure/.terraform.lock.hcl @@ -2,21 +2,21 @@ # Manual edits may be lost in future updates. provider "registry.terraform.io/hashicorp/google" { - version = "7.1.1" + version = "7.19.0" hashes = [ - "h1:Hu/Gy8dB7TXsUyswqm6XJhr7esYmXk9Ea/Jo9VgT4LE=", - "zh:03ee9fdc0d157a606aba68658de6dc809fc3335cccb7c537373d8643412c1327", - "zh:110e8ffe81deb8c203ecf310a15c2dedca1dfc936473a247b8a4f98adebd86f5", - "zh:459e3419c004e7a475fb60cc52d47a34b3dc4e4de905eaa8e8f78ddbe550a9b5", - "zh:466cd31cee36877bc18aeabed80d1f4a22bac4e59a460be6e8bdb72dedca0e2b", - "zh:51d707eb2d854fa16dcbe21e29b01534eb893a2152a219ea84a15bbd87a4ff64", - "zh:69d6a1c83ffddd7f81273a98fb0ff7c13985a3c876565dd3df76c730c9929871", - "zh:9b5050da221735c7e8f75ed00d25578afaf8ed94a8c2f1f58f471eee98105d10", - "zh:ab01f2fd961ee86d99a55186093620d29f5323c0cd5613284d484e333679d70b", - "zh:d0f5b15774b15991baf71eb4a55a6831e3fb4b603f589f80b03393b46a9657a4", - "zh:dc198ec4b42435321f4fa12ca8d713cd350ff2f82d8749b87785b91b15b7c3ed", - "zh:e949c00ce89c92b7ed16cc0b0aed8e80d6416b240dc02047f9fa1de49aa4c44e", + "h1:8lfoMp5YTC0pDT5da1fOJNnEaCm8JWClTo51g9ceipE=", + "zh:06da157d858384b2383414447c1bf6cf319ad72ea87d7030c6ca18b9bb774f73", + "zh:2f1d7c3461a6b59ffcf0eed2f3764e2f0a2c70464927e561d968d82112e3600d", + "zh:4705ce487e6b2c52376e1f9bc0dc650e8326ab3e20d0673c9fed62e1313d2d67", + "zh:5cd9a4ee36d3d7ffbabb90c83cb7cce54cf0f10c912db4be7492ebc1a78611b3", + "zh:688622dbac98fe95115518ff3d9324cf71ffdf124ca6e66b2269f43d9f8e7ceb", + "zh:7a5c07ae0728c7a57a63d848411c91550fd3bfe662f60821b50d3370be360134", + "zh:8a6472dec8082d7225a811c8ee0bf550c7a9c36e86cfd19b10363106f2dfbb80", + "zh:8e11d4c27e70500aaa1335cb721ad64c4b0e41b3c7398d6fe58a3d92f10ea213", + "zh:9a119c27e27bad73cdd8c0544f8a68a84bdac3de0129f13a87a6890ed19c6035", + "zh:dd12460d2b8b4497b5a7c46bb486ace9859d2fc642782989df315e618596d1e4", "zh:f569b65999264a9416862bca5cd2a6177d94ccb0424f3a4ef424428912b9cb3c", + "zh:fc35c660777b377978e5f2d008db6181ff2f98777cdd215effc11d665e99e0bc", ] } diff --git a/inputs/gcp/cloud_platform_service/google_service_account_key/exposure/plan.json b/inputs/gcp/cloud_platform_service/google_service_account_key/exposure/plan.json new file mode 100644 index 000000000..9a917691e --- /dev/null +++ b/inputs/gcp/cloud_platform_service/google_service_account_key/exposure/plan.json @@ -0,0 +1 @@ +{"format_version":"1.2","terraform_version":"1.13.3","planned_values":{"root_module":{"resources":[{"address":"google_service_account.c_sa","mode":"managed","type":"google_service_account","name":"c_sa","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"account_id":"compliant-sa","create_ignore_already_exists":null,"description":null,"disabled":false,"display_name":"Compliant Service Account","email":"compliant-sa@proj-sec-test123.iam.gserviceaccount.com","member":"serviceAccount:compliant-sa@proj-sec-test123.iam.gserviceaccount.com","project":"proj-sec-test123","timeouts":null},"sensitive_values":{}},{"address":"google_service_account_key.c1","mode":"managed","type":"google_service_account_key","name":"c1","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"key_algorithm":"KEY_ALG_RSA_2048","private_key_type":"TYPE_GOOGLE_CREDENTIALS_FILE","public_key_data":null,"public_key_type":"TYPE_X509_PEM_FILE"},"sensitive_values":{"keepers":{},"private_key":true}},{"address":"google_service_account_key.nc1","mode":"managed","type":"google_service_account_key","name":"nc1","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"keepers":null,"key_algorithm":"KEY_ALG_RSA_1024","private_key_type":"TYPE_GOOGLE_CREDENTIALS_FILE","public_key_data":null,"public_key_type":"TYPE_X509_PEM_FILE","service_account_id":"projects/my-project/serviceAccounts/my-sa@my-project.iam.gserviceaccount.com"},"sensitive_values":{"private_key":true}},{"address":"time_rotating.rotation","mode":"managed","type":"time_rotating","name":"rotation","provider_name":"registry.terraform.io/hashicorp/time","schema_version":0,"values":{"rotation_days":30,"rotation_hours":null,"rotation_minutes":null,"rotation_months":null,"rotation_years":null,"triggers":null},"sensitive_values":{}}]}},"resource_changes":[{"address":"google_service_account.c_sa","mode":"managed","type":"google_service_account","name":"c_sa","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"account_id":"compliant-sa","create_ignore_already_exists":null,"description":null,"disabled":false,"display_name":"Compliant Service Account","email":"compliant-sa@proj-sec-test123.iam.gserviceaccount.com","member":"serviceAccount:compliant-sa@proj-sec-test123.iam.gserviceaccount.com","project":"proj-sec-test123","timeouts":null},"after_unknown":{"id":true,"name":true,"unique_id":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"google_service_account_key.c1","mode":"managed","type":"google_service_account_key","name":"c1","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"key_algorithm":"KEY_ALG_RSA_2048","private_key_type":"TYPE_GOOGLE_CREDENTIALS_FILE","public_key_data":null,"public_key_type":"TYPE_X509_PEM_FILE"},"after_unknown":{"id":true,"keepers":true,"name":true,"private_key":true,"public_key":true,"service_account_id":true,"valid_after":true,"valid_before":true},"before_sensitive":false,"after_sensitive":{"keepers":{},"private_key":true}}},{"address":"google_service_account_key.nc1","mode":"managed","type":"google_service_account_key","name":"nc1","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"keepers":null,"key_algorithm":"KEY_ALG_RSA_1024","private_key_type":"TYPE_GOOGLE_CREDENTIALS_FILE","public_key_data":null,"public_key_type":"TYPE_X509_PEM_FILE","service_account_id":"projects/my-project/serviceAccounts/my-sa@my-project.iam.gserviceaccount.com"},"after_unknown":{"id":true,"name":true,"private_key":true,"public_key":true,"valid_after":true,"valid_before":true},"before_sensitive":false,"after_sensitive":{"private_key":true}}},{"address":"time_rotating.rotation","mode":"managed","type":"time_rotating","name":"rotation","provider_name":"registry.terraform.io/hashicorp/time","change":{"actions":["create"],"before":null,"after":{"rotation_days":30,"rotation_hours":null,"rotation_minutes":null,"rotation_months":null,"rotation_years":null,"triggers":null},"after_unknown":{"day":true,"hour":true,"id":true,"minute":true,"month":true,"rfc3339":true,"rotation_rfc3339":true,"second":true,"unix":true,"year":true},"before_sensitive":false,"after_sensitive":{}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"},"time":{"name":"time","full_name":"registry.terraform.io/hashicorp/time"}},"root_module":{"resources":[{"address":"google_service_account.c_sa","mode":"managed","type":"google_service_account","name":"c_sa","provider_config_key":"google","expressions":{"account_id":{"constant_value":"compliant-sa"},"display_name":{"constant_value":"Compliant Service Account"},"project":{"constant_value":"proj-sec-test123"}},"schema_version":0},{"address":"google_service_account_key.c1","mode":"managed","type":"google_service_account_key","name":"c1","provider_config_key":"google","expressions":{"keepers":{"references":["time_rotating.rotation.rotation_rfc3339","time_rotating.rotation"]},"key_algorithm":{"constant_value":"KEY_ALG_RSA_2048"},"public_key_type":{"constant_value":"TYPE_X509_PEM_FILE"},"service_account_id":{"references":["google_service_account.c_sa.name","google_service_account.c_sa"]}},"schema_version":0},{"address":"google_service_account_key.nc1","mode":"managed","type":"google_service_account_key","name":"nc1","provider_config_key":"google","expressions":{"key_algorithm":{"constant_value":"KEY_ALG_RSA_1024"},"private_key_type":{"constant_value":"TYPE_GOOGLE_CREDENTIALS_FILE"},"service_account_id":{"constant_value":"projects/my-project/serviceAccounts/my-sa@my-project.iam.gserviceaccount.com"}},"schema_version":0},{"address":"time_rotating.rotation","mode":"managed","type":"time_rotating","name":"rotation","provider_config_key":"time","expressions":{"rotation_days":{"constant_value":30}},"schema_version":0}]}},"relevant_attributes":[{"resource":"google_service_account.c_sa","attribute":["name"]},{"resource":"time_rotating.rotation","attribute":["rotation_rfc3339"]}],"timestamp":"2026-02-11T08:59:55Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/cloud_vmware_engine/external_access_rule/block_broad_external_access/.terraform.lock.hcl b/inputs/gcp/cloud_vmware_engine/external_access_rule/block_broad_external_access/.terraform.lock.hcl index f19ce156d..5698484ba 100644 --- a/inputs/gcp/cloud_vmware_engine/external_access_rule/block_broad_external_access/.terraform.lock.hcl +++ b/inputs/gcp/cloud_vmware_engine/external_access_rule/block_broad_external_access/.terraform.lock.hcl @@ -2,21 +2,20 @@ # Manual edits may be lost in future updates. provider "registry.terraform.io/hashicorp/google" { - version = "6.8.0" - constraints = "6.8.0" + version = "7.16.0" hashes = [ - "h1:xdFVxNzvhzX8sbkMhmBhmViiyoc8PYbkaig6rgs0Ud0=", - "zh:1b78f4451f1617092eb6891c9c13eda79671060601c40947feea6794c732157a", - "zh:4c6d7231ce32c6ff2a98218ef363c133d27d423b009354e7fe18459d9feb41d4", - "zh:6ae0112e9c733ab6c72436a334ffe3f197a613bb04f49538462b83b236d37a2d", - "zh:8bd5651838ad674e0a173a453b76c80b94d08ebcb8ea0b6263ce6da0599b42f5", - "zh:94ee7bcd77b0b7c2777113e35282da014e61e813fe46c058a49bf3d616fecdf4", - "zh:c0bf014422c2971985d34ad45ddb6aa737373398f83b325884ea5608ac1264aa", - "zh:c2cbbf0c249c3d1842ad0ad77fb7ef85bd3e92c688618c4087173bc1d69cd098", - "zh:cefa3e06cb353d08b83dafa6135cd78e17540ae735b7c5687833cc1925c3fd8e", - "zh:d20bc0216bf7f054f6318467d3902ced05e9f0bfa500ee55bf43b1b41ef0b854", - "zh:e54ad5959e53b9e9acafc243d6f4039ab5005cec32c7435a122da964888d184c", - "zh:e833c8de147268b3ffc14c60915eccb9347ade5f25b37b3771240a4d68b6aac4", + "h1:o+dOw75zzgpJAUdjEa2a2T62OEThcEr52/4CymRAewA=", + "zh:1cd6f0926e5884998965675d3fbdc5e5abd7335d3f5f83571226be7f50f44443", + "zh:2bc3e3db662df08755af37d23c856f0ec3b8474f629f042ad3af228ff1c3cb5a", + "zh:41869013f786bff8c2ba35e203e84b6c3ec9ff623d6cea6796f5f0204719e907", + "zh:493213e16cb8de6a39b0d6b327faab7909f32ad973fb937d2b3bc4faa07c911a", + "zh:5e9df66ddeef9fcf77acd6185fe880e6b3725b98850ea3b47ef726c44dc04a71", + "zh:6b9e8f83316cf660549a4032342107bb41a7e549eba923f69aefa1ae5ab80a3f", + "zh:6da9316ca7c70d4997c4a62cd534f674e02888e351cb189f7b77b5a03e803773", + "zh:7d1b1dc7c04924dd203e9c5d2041fb732b1e2556b4041c9272a786d37924be7c", + "zh:86dcafef126ad72b592582d8fdb2591d8a2cb45ff85e5f5ff0ac76fbbd7be1bb", + "zh:8a8994c67297336ede3ded9d2558104d49de6fdfa85b88dc99b50030d68158cf", + "zh:a67d8b4774cdb45fb13e73e15885e229561a8b8f46d9f0069b81bf4d3ca03c4a", "zh:f569b65999264a9416862bca5cd2a6177d94ccb0424f3a4ef424428912b9cb3c", ] } diff --git a/inputs/gcp/cloud_vmware_engine/external_access_rule/block_broad_external_access/c.tf b/inputs/gcp/cloud_vmware_engine/external_access_rule/block_broad_external_access/c.tf index 7c24e84e6..650e24c32 100644 --- a/inputs/gcp/cloud_vmware_engine/external_access_rule/block_broad_external_access/c.tf +++ b/inputs/gcp/cloud_vmware_engine/external_access_rule/block_broad_external_access/c.tf @@ -1,20 +1,6 @@ -resource "google_vmwareengine_network" "external-access-rule-nw" { - name = "sample-nw" - location = "global" - type = "STANDARD" - description = "PC network description." -} - -resource "google_vmwareengine_network_policy" "external-access-rule-np" { - location = "us-west1" - name = "sample-np" - edge_services_cidr = "192.168.30.0/26" - vmware_engine_network = google_vmwareengine_network.external-access-rule-nw.id -} - resource "google_vmwareengine_external_access_rule" "c" { name = "c" - parent = google_vmwareengine_network_policy.external-access-rule-np.id + parent = "c" priority = 101 action = "ALLOW" ip_protocol = "TCP" diff --git a/inputs/gcp/managed_kafka/google_managed_kafka_connect_cluster/enforce_private_networking/config.tf b/inputs/gcp/cloud_vmware_engine/external_access_rule/block_broad_external_access/config.tf similarity index 77% rename from inputs/gcp/managed_kafka/google_managed_kafka_connect_cluster/enforce_private_networking/config.tf rename to inputs/gcp/cloud_vmware_engine/external_access_rule/block_broad_external_access/config.tf index 9f4356520..05906d614 100644 --- a/inputs/gcp/managed_kafka/google_managed_kafka_connect_cluster/enforce_private_networking/config.tf +++ b/inputs/gcp/cloud_vmware_engine/external_access_rule/block_broad_external_access/config.tf @@ -1,10 +1,8 @@ -##### DO NOT EDIT ###### - terraform { required_providers { google = { source = "hashicorp/google" - } + } } } diff --git a/inputs/gcp/cloud_vmware_engine/external_access_rule/block_broad_external_access/nc.tf b/inputs/gcp/cloud_vmware_engine/external_access_rule/block_broad_external_access/nc.tf index 7f3f70554..f8ec07b2b 100644 --- a/inputs/gcp/cloud_vmware_engine/external_access_rule/block_broad_external_access/nc.tf +++ b/inputs/gcp/cloud_vmware_engine/external_access_rule/block_broad_external_access/nc.tf @@ -1,23 +1,9 @@ -resource "google_vmwareengine_network" "external-access-rule-nw_nc" { - name = "sample-nw" - location = "global" - type = "STANDARD" - description = "PC network description." -} - -resource "google_vmwareengine_network_policy" "external-access-rule-np_nc" { - location = "us-west1" - name = "sample-np" - edge_services_cidr = "192.168.30.0/26" - vmware_engine_network = google_vmwareengine_network.external-access-rule-nw.id -} - resource "google_vmwareengine_external_access_rule" "nc" { name = "nc" - parent = google_vmwareengine_network_policy.external-access-rule-np_nc.id + parent = "nc" priority = 101 action = "ALLOW" - ip_protocol = "TCP" + ip_protocol = "UDP" source_ip_ranges { ip_address_range = "0.0.0.0/0" } diff --git a/inputs/gcp/cloud_vmware_engine/external_access_rule/block_broad_external_access/plan b/inputs/gcp/cloud_vmware_engine/external_access_rule/block_broad_external_access/plan deleted file mode 100644 index 53e446bd8..000000000 Binary files a/inputs/gcp/cloud_vmware_engine/external_access_rule/block_broad_external_access/plan and /dev/null differ diff --git a/inputs/gcp/cloud_vmware_engine/external_access_rule/block_broad_external_access/plan.json b/inputs/gcp/cloud_vmware_engine/external_access_rule/block_broad_external_access/plan.json deleted file mode 100644 index 95ec29317..000000000 --- a/inputs/gcp/cloud_vmware_engine/external_access_rule/block_broad_external_access/plan.json +++ /dev/null @@ -1 +0,0 @@ -{"format_version":"1.2","terraform_version":"1.9.5","planned_values":{"root_module":{"resources":[{"address":"google_vmwareengine_external_access_rule.c","mode":"managed","type":"google_vmwareengine_external_access_rule","name":"c","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"action":"ALLOW","description":null,"destination_ip_ranges":[{"external_address":null,"ip_address_range":"100.0.0.0/0"}],"destination_ports":["433"],"ip_protocol":"TCP","name":"sample-external-access-rule-c","priority":101,"source_ip_ranges":[{"ip_address":null,"ip_address_range":"100.0.0.0/0"}],"source_ports":["80"],"timeouts":null},"sensitive_values":{"destination_ip_ranges":[{}],"destination_ports":[false],"source_ip_ranges":[{}],"source_ports":[false]}},{"address":"google_vmwareengine_external_access_rule.nc","mode":"managed","type":"google_vmwareengine_external_access_rule","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"action":"ALLOW","description":null,"destination_ip_ranges":[{"external_address":null,"ip_address_range":"0.0.0.0/0"}],"destination_ports":["*"],"ip_protocol":"TCP","name":"sample-external-access-rule-nc","priority":101,"source_ip_ranges":[{"ip_address":null,"ip_address_range":"0.0.0.0/0"}],"source_ports":["*"],"timeouts":null},"sensitive_values":{"destination_ip_ranges":[{}],"destination_ports":[false],"source_ip_ranges":[{}],"source_ports":[false]}},{"address":"google_vmwareengine_network.external-access-rule-nw","mode":"managed","type":"google_vmwareengine_network","name":"external-access-rule-nw","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"description":"PC network description.","location":"global","name":"sample-nw","project":"fake-project","timeouts":null,"type":"STANDARD"},"sensitive_values":{"vpc_networks":[]}},{"address":"google_vmwareengine_network.external-access-rule-nw_nc","mode":"managed","type":"google_vmwareengine_network","name":"external-access-rule-nw_nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"description":"PC network description.","location":"global","name":"sample-nw","project":"fake-project","timeouts":null,"type":"STANDARD"},"sensitive_values":{"vpc_networks":[]}},{"address":"google_vmwareengine_network_policy.external-access-rule-np","mode":"managed","type":"google_vmwareengine_network_policy","name":"external-access-rule-np","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"description":null,"edge_services_cidr":"192.168.30.0/26","location":"us-west1","name":"sample-np","project":"fake-project","timeouts":null},"sensitive_values":{"external_ip":[],"internet_access":[]}},{"address":"google_vmwareengine_network_policy.external-access-rule-np_nc","mode":"managed","type":"google_vmwareengine_network_policy","name":"external-access-rule-np_nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"description":null,"edge_services_cidr":"192.168.30.0/26","location":"us-west1","name":"sample-np","project":"fake-project","timeouts":null},"sensitive_values":{"external_ip":[],"internet_access":[]}}]}},"resource_changes":[{"address":"google_vmwareengine_external_access_rule.c","mode":"managed","type":"google_vmwareengine_external_access_rule","name":"c","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"action":"ALLOW","description":null,"destination_ip_ranges":[{"external_address":null,"ip_address_range":"100.0.0.0/0"}],"destination_ports":["433"],"ip_protocol":"TCP","name":"sample-external-access-rule-c","priority":101,"source_ip_ranges":[{"ip_address":null,"ip_address_range":"100.0.0.0/0"}],"source_ports":["80"],"timeouts":null},"after_unknown":{"create_time":true,"destination_ip_ranges":[{}],"destination_ports":[false],"id":true,"parent":true,"source_ip_ranges":[{}],"source_ports":[false],"state":true,"uid":true,"update_time":true},"before_sensitive":false,"after_sensitive":{"destination_ip_ranges":[{}],"destination_ports":[false],"source_ip_ranges":[{}],"source_ports":[false]}}},{"address":"google_vmwareengine_external_access_rule.nc","mode":"managed","type":"google_vmwareengine_external_access_rule","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"action":"ALLOW","description":null,"destination_ip_ranges":[{"external_address":null,"ip_address_range":"0.0.0.0/0"}],"destination_ports":["*"],"ip_protocol":"TCP","name":"sample-external-access-rule-nc","priority":101,"source_ip_ranges":[{"ip_address":null,"ip_address_range":"0.0.0.0/0"}],"source_ports":["*"],"timeouts":null},"after_unknown":{"create_time":true,"destination_ip_ranges":[{}],"destination_ports":[false],"id":true,"parent":true,"source_ip_ranges":[{}],"source_ports":[false],"state":true,"uid":true,"update_time":true},"before_sensitive":false,"after_sensitive":{"destination_ip_ranges":[{}],"destination_ports":[false],"source_ip_ranges":[{}],"source_ports":[false]}}},{"address":"google_vmwareengine_network.external-access-rule-nw","mode":"managed","type":"google_vmwareengine_network","name":"external-access-rule-nw","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"description":"PC network description.","location":"global","name":"sample-nw","project":"fake-project","timeouts":null,"type":"STANDARD"},"after_unknown":{"id":true,"state":true,"uid":true,"vpc_networks":true},"before_sensitive":false,"after_sensitive":{"vpc_networks":[]}}},{"address":"google_vmwareengine_network.external-access-rule-nw_nc","mode":"managed","type":"google_vmwareengine_network","name":"external-access-rule-nw_nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"description":"PC network description.","location":"global","name":"sample-nw","project":"fake-project","timeouts":null,"type":"STANDARD"},"after_unknown":{"id":true,"state":true,"uid":true,"vpc_networks":true},"before_sensitive":false,"after_sensitive":{"vpc_networks":[]}}},{"address":"google_vmwareengine_network_policy.external-access-rule-np","mode":"managed","type":"google_vmwareengine_network_policy","name":"external-access-rule-np","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"description":null,"edge_services_cidr":"192.168.30.0/26","location":"us-west1","name":"sample-np","project":"fake-project","timeouts":null},"after_unknown":{"create_time":true,"external_ip":true,"id":true,"internet_access":true,"uid":true,"update_time":true,"vmware_engine_network":true,"vmware_engine_network_canonical":true},"before_sensitive":false,"after_sensitive":{"external_ip":[],"internet_access":[]}}},{"address":"google_vmwareengine_network_policy.external-access-rule-np_nc","mode":"managed","type":"google_vmwareengine_network_policy","name":"external-access-rule-np_nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"description":null,"edge_services_cidr":"192.168.30.0/26","location":"us-west1","name":"sample-np","project":"fake-project","timeouts":null},"after_unknown":{"create_time":true,"external_ip":true,"id":true,"internet_access":true,"uid":true,"update_time":true,"vmware_engine_network":true,"vmware_engine_network_canonical":true},"before_sensitive":false,"after_sensitive":{"external_ip":[],"internet_access":[]}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_vmwareengine_external_access_rule.c","mode":"managed","type":"google_vmwareengine_external_access_rule","name":"c","provider_config_key":"google","expressions":{"action":{"constant_value":"ALLOW"},"destination_ip_ranges":[{"ip_address_range":{"constant_value":"100.0.0.0/0"}}],"destination_ports":{"constant_value":["433"]},"ip_protocol":{"constant_value":"TCP"},"name":{"constant_value":"sample-external-access-rule-c"},"parent":{"references":["google_vmwareengine_network_policy.external-access-rule-np.id","google_vmwareengine_network_policy.external-access-rule-np"]},"priority":{"constant_value":101},"source_ip_ranges":[{"ip_address_range":{"constant_value":"100.0.0.0/0"}}],"source_ports":{"constant_value":["80"]}},"schema_version":0},{"address":"google_vmwareengine_external_access_rule.nc","mode":"managed","type":"google_vmwareengine_external_access_rule","name":"nc","provider_config_key":"google","expressions":{"action":{"constant_value":"ALLOW"},"destination_ip_ranges":[{"ip_address_range":{"constant_value":"0.0.0.0/0"}}],"destination_ports":{"constant_value":["*"]},"ip_protocol":{"constant_value":"TCP"},"name":{"constant_value":"sample-external-access-rule-nc"},"parent":{"references":["google_vmwareengine_network_policy.external-access-rule-np_nc.id","google_vmwareengine_network_policy.external-access-rule-np_nc"]},"priority":{"constant_value":101},"source_ip_ranges":[{"ip_address_range":{"constant_value":"0.0.0.0/0"}}],"source_ports":{"constant_value":["*"]}},"schema_version":0},{"address":"google_vmwareengine_network.external-access-rule-nw","mode":"managed","type":"google_vmwareengine_network","name":"external-access-rule-nw","provider_config_key":"google","expressions":{"description":{"constant_value":"PC network description."},"location":{"constant_value":"global"},"name":{"constant_value":"sample-nw"},"type":{"constant_value":"STANDARD"}},"schema_version":0},{"address":"google_vmwareengine_network.external-access-rule-nw_nc","mode":"managed","type":"google_vmwareengine_network","name":"external-access-rule-nw_nc","provider_config_key":"google","expressions":{"description":{"constant_value":"PC network description."},"location":{"constant_value":"global"},"name":{"constant_value":"sample-nw"},"type":{"constant_value":"STANDARD"}},"schema_version":0},{"address":"google_vmwareengine_network_policy.external-access-rule-np","mode":"managed","type":"google_vmwareengine_network_policy","name":"external-access-rule-np","provider_config_key":"google","expressions":{"edge_services_cidr":{"constant_value":"192.168.30.0/26"},"location":{"constant_value":"us-west1"},"name":{"constant_value":"sample-np"},"vmware_engine_network":{"references":["google_vmwareengine_network.external-access-rule-nw.id","google_vmwareengine_network.external-access-rule-nw"]}},"schema_version":0},{"address":"google_vmwareengine_network_policy.external-access-rule-np_nc","mode":"managed","type":"google_vmwareengine_network_policy","name":"external-access-rule-np_nc","provider_config_key":"google","expressions":{"edge_services_cidr":{"constant_value":"192.168.30.0/26"},"location":{"constant_value":"us-west1"},"name":{"constant_value":"sample-np"},"vmware_engine_network":{"references":["google_vmwareengine_network.external-access-rule-nw.id","google_vmwareengine_network.external-access-rule-nw"]}},"schema_version":0}]}},"relevant_attributes":[{"resource":"google_vmwareengine_network_policy.external-access-rule-np","attribute":["id"]},{"resource":"google_vmwareengine_network_policy.external-access-rule-np_nc","attribute":["id"]},{"resource":"google_vmwareengine_network.external-access-rule-nw","attribute":["id"]}],"timestamp":"2025-09-08T10:06:07Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/cloud_vmware_engine/network/allowed_location/.terraform.lock.hcl b/inputs/gcp/cloud_vmware_engine/network/allowed_location/.terraform.lock.hcl index f19ce156d..5698484ba 100644 --- a/inputs/gcp/cloud_vmware_engine/network/allowed_location/.terraform.lock.hcl +++ b/inputs/gcp/cloud_vmware_engine/network/allowed_location/.terraform.lock.hcl @@ -2,21 +2,20 @@ # Manual edits may be lost in future updates. provider "registry.terraform.io/hashicorp/google" { - version = "6.8.0" - constraints = "6.8.0" + version = "7.16.0" hashes = [ - "h1:xdFVxNzvhzX8sbkMhmBhmViiyoc8PYbkaig6rgs0Ud0=", - "zh:1b78f4451f1617092eb6891c9c13eda79671060601c40947feea6794c732157a", - "zh:4c6d7231ce32c6ff2a98218ef363c133d27d423b009354e7fe18459d9feb41d4", - "zh:6ae0112e9c733ab6c72436a334ffe3f197a613bb04f49538462b83b236d37a2d", - "zh:8bd5651838ad674e0a173a453b76c80b94d08ebcb8ea0b6263ce6da0599b42f5", - "zh:94ee7bcd77b0b7c2777113e35282da014e61e813fe46c058a49bf3d616fecdf4", - "zh:c0bf014422c2971985d34ad45ddb6aa737373398f83b325884ea5608ac1264aa", - "zh:c2cbbf0c249c3d1842ad0ad77fb7ef85bd3e92c688618c4087173bc1d69cd098", - "zh:cefa3e06cb353d08b83dafa6135cd78e17540ae735b7c5687833cc1925c3fd8e", - "zh:d20bc0216bf7f054f6318467d3902ced05e9f0bfa500ee55bf43b1b41ef0b854", - "zh:e54ad5959e53b9e9acafc243d6f4039ab5005cec32c7435a122da964888d184c", - "zh:e833c8de147268b3ffc14c60915eccb9347ade5f25b37b3771240a4d68b6aac4", + "h1:o+dOw75zzgpJAUdjEa2a2T62OEThcEr52/4CymRAewA=", + "zh:1cd6f0926e5884998965675d3fbdc5e5abd7335d3f5f83571226be7f50f44443", + "zh:2bc3e3db662df08755af37d23c856f0ec3b8474f629f042ad3af228ff1c3cb5a", + "zh:41869013f786bff8c2ba35e203e84b6c3ec9ff623d6cea6796f5f0204719e907", + "zh:493213e16cb8de6a39b0d6b327faab7909f32ad973fb937d2b3bc4faa07c911a", + "zh:5e9df66ddeef9fcf77acd6185fe880e6b3725b98850ea3b47ef726c44dc04a71", + "zh:6b9e8f83316cf660549a4032342107bb41a7e549eba923f69aefa1ae5ab80a3f", + "zh:6da9316ca7c70d4997c4a62cd534f674e02888e351cb189f7b77b5a03e803773", + "zh:7d1b1dc7c04924dd203e9c5d2041fb732b1e2556b4041c9272a786d37924be7c", + "zh:86dcafef126ad72b592582d8fdb2591d8a2cb45ff85e5f5ff0ac76fbbd7be1bb", + "zh:8a8994c67297336ede3ded9d2558104d49de6fdfa85b88dc99b50030d68158cf", + "zh:a67d8b4774cdb45fb13e73e15885e229561a8b8f46d9f0069b81bf4d3ca03c4a", "zh:f569b65999264a9416862bca5cd2a6177d94ccb0424f3a4ef424428912b9cb3c", ] } diff --git a/inputs/gcp/firestore/firestore_document/project/config.tf b/inputs/gcp/cloud_vmware_engine/network/allowed_location/config.tf similarity index 76% rename from inputs/gcp/firestore/firestore_document/project/config.tf rename to inputs/gcp/cloud_vmware_engine/network/allowed_location/config.tf index b33462b4f..05906d614 100644 --- a/inputs/gcp/firestore/firestore_document/project/config.tf +++ b/inputs/gcp/cloud_vmware_engine/network/allowed_location/config.tf @@ -2,8 +2,7 @@ terraform { required_providers { google = { source = "hashicorp/google" - version = ">= 6.15.0" - } + } } } diff --git a/inputs/gcp/cloud_vmware_engine/network/allowed_location/plan b/inputs/gcp/cloud_vmware_engine/network/allowed_location/plan deleted file mode 100644 index 467d32bf6..000000000 Binary files a/inputs/gcp/cloud_vmware_engine/network/allowed_location/plan and /dev/null differ diff --git a/inputs/gcp/cloud_vmware_engine/network/allowed_location/plan.json b/inputs/gcp/cloud_vmware_engine/network/allowed_location/plan.json deleted file mode 100644 index 930acb93d..000000000 --- a/inputs/gcp/cloud_vmware_engine/network/allowed_location/plan.json +++ /dev/null @@ -1 +0,0 @@ -{"format_version":"1.2","terraform_version":"1.9.5","planned_values":{"root_module":{"resources":[{"address":"google_project.acceptance","mode":"managed","type":"google_project","name":"acceptance","provider_name":"registry.terraform.io/hashicorp/google","schema_version":1,"values":{"auto_create_network":true,"billing_account":"000000-0000000-0000000-000000","deletion_policy":"DELETE","effective_labels":{"goog-terraform-provisioned":"true"},"folder_id":null,"labels":null,"name":"vmw-proj","org_id":"123456789","project_id":"vmw-proj","tags":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"sensitive_values":{"effective_labels":{},"terraform_labels":{}}},{"address":"google_project.acceptance_nc","mode":"managed","type":"google_project","name":"acceptance_nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":1,"values":{"auto_create_network":true,"billing_account":"000000-0000000-0000000-000000","deletion_policy":"DELETE","effective_labels":{"goog-terraform-provisioned":"true"},"folder_id":null,"labels":null,"name":"vmw-proj","org_id":"123456789","project_id":"vmw-proj","tags":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"sensitive_values":{"effective_labels":{},"terraform_labels":{}}},{"address":"google_project_service.acceptance","mode":"managed","type":"google_project_service","name":"acceptance","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"disable_dependent_services":null,"disable_on_destroy":true,"project":"vmw-proj","service":"vmwareengine.googleapis.com","timeouts":null},"sensitive_values":{}},{"address":"google_project_service.acceptance_nc","mode":"managed","type":"google_project_service","name":"acceptance_nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"disable_dependent_services":null,"disable_on_destroy":true,"project":"vmw-proj","service":"vmwareengine.googleapis.com","timeouts":null},"sensitive_values":{}},{"address":"google_vmwareengine_network.c","mode":"managed","type":"google_vmwareengine_network","name":"c","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"description":"VMwareEngine legacy network sample","location":"australia-southeast2","name":"australia-southeast2-c-default","project":"vmw-proj","timeouts":null,"type":"LEGACY"},"sensitive_values":{"vpc_networks":[]}},{"address":"google_vmwareengine_network.nc","mode":"managed","type":"google_vmwareengine_network","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"description":"VMwareEngine legacy network sample","location":"us-west1","name":"us-west1-nc-default","project":"vmw-proj","timeouts":null,"type":"LEGACY"},"sensitive_values":{"vpc_networks":[]}}]}},"resource_changes":[{"address":"google_project.acceptance","mode":"managed","type":"google_project","name":"acceptance","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"auto_create_network":true,"billing_account":"000000-0000000-0000000-000000","deletion_policy":"DELETE","effective_labels":{"goog-terraform-provisioned":"true"},"folder_id":null,"labels":null,"name":"vmw-proj","org_id":"123456789","project_id":"vmw-proj","tags":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"after_unknown":{"effective_labels":{},"id":true,"number":true,"terraform_labels":{}},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"terraform_labels":{}}}},{"address":"google_project.acceptance_nc","mode":"managed","type":"google_project","name":"acceptance_nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"auto_create_network":true,"billing_account":"000000-0000000-0000000-000000","deletion_policy":"DELETE","effective_labels":{"goog-terraform-provisioned":"true"},"folder_id":null,"labels":null,"name":"vmw-proj","org_id":"123456789","project_id":"vmw-proj","tags":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"after_unknown":{"effective_labels":{},"id":true,"number":true,"terraform_labels":{}},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"terraform_labels":{}}}},{"address":"google_project_service.acceptance","mode":"managed","type":"google_project_service","name":"acceptance","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"disable_dependent_services":null,"disable_on_destroy":true,"project":"vmw-proj","service":"vmwareengine.googleapis.com","timeouts":null},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"google_project_service.acceptance_nc","mode":"managed","type":"google_project_service","name":"acceptance_nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"disable_dependent_services":null,"disable_on_destroy":true,"project":"vmw-proj","service":"vmwareengine.googleapis.com","timeouts":null},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"google_vmwareengine_network.c","mode":"managed","type":"google_vmwareengine_network","name":"c","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"description":"VMwareEngine legacy network sample","location":"australia-southeast2","name":"australia-southeast2-c-default","project":"vmw-proj","timeouts":null,"type":"LEGACY"},"after_unknown":{"id":true,"state":true,"uid":true,"vpc_networks":true},"before_sensitive":false,"after_sensitive":{"vpc_networks":[]}}},{"address":"google_vmwareengine_network.nc","mode":"managed","type":"google_vmwareengine_network","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"description":"VMwareEngine legacy network sample","location":"us-west1","name":"us-west1-nc-default","project":"vmw-proj","timeouts":null,"type":"LEGACY"},"after_unknown":{"id":true,"state":true,"uid":true,"vpc_networks":true},"before_sensitive":false,"after_sensitive":{"vpc_networks":[]}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_project.acceptance","mode":"managed","type":"google_project","name":"acceptance","provider_config_key":"google","expressions":{"billing_account":{"constant_value":"000000-0000000-0000000-000000"},"deletion_policy":{"constant_value":"DELETE"},"name":{"constant_value":"vmw-proj"},"org_id":{"constant_value":"123456789"},"project_id":{"constant_value":"vmw-proj"}},"schema_version":1},{"address":"google_project.acceptance_nc","mode":"managed","type":"google_project","name":"acceptance_nc","provider_config_key":"google","expressions":{"billing_account":{"constant_value":"000000-0000000-0000000-000000"},"deletion_policy":{"constant_value":"DELETE"},"name":{"constant_value":"vmw-proj"},"org_id":{"constant_value":"123456789"},"project_id":{"constant_value":"vmw-proj"}},"schema_version":1},{"address":"google_project_service.acceptance","mode":"managed","type":"google_project_service","name":"acceptance","provider_config_key":"google","expressions":{"project":{"references":["google_project.acceptance.project_id","google_project.acceptance"]},"service":{"constant_value":"vmwareengine.googleapis.com"}},"schema_version":0},{"address":"google_project_service.acceptance_nc","mode":"managed","type":"google_project_service","name":"acceptance_nc","provider_config_key":"google","expressions":{"project":{"references":["google_project.acceptance_nc.project_id","google_project.acceptance_nc"]},"service":{"constant_value":"vmwareengine.googleapis.com"}},"schema_version":0},{"address":"google_vmwareengine_network.c","mode":"managed","type":"google_vmwareengine_network","name":"c","provider_config_key":"google","expressions":{"description":{"constant_value":"VMwareEngine legacy network sample"},"location":{"constant_value":"australia-southeast2"},"name":{"constant_value":"australia-southeast2-c-default"},"project":{"references":["google_project_service.acceptance.project","google_project_service.acceptance"]},"type":{"constant_value":"LEGACY"}},"schema_version":0},{"address":"google_vmwareengine_network.nc","mode":"managed","type":"google_vmwareengine_network","name":"nc","provider_config_key":"google","expressions":{"description":{"constant_value":"VMwareEngine legacy network sample"},"location":{"constant_value":"us-west1"},"name":{"constant_value":"us-west1-nc-default"},"project":{"references":["google_project_service.acceptance_nc.project","google_project_service.acceptance_nc"]},"type":{"constant_value":"LEGACY"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"google_project.acceptance_nc","attribute":["project_id"]},{"resource":"google_project.acceptance","attribute":["project_id"]},{"resource":"google_project_service.acceptance_nc","attribute":["project"]},{"resource":"google_project_service.acceptance","attribute":["project"]}],"timestamp":"2025-09-08T10:06:09Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/cloud_vmware_engine/network/block_legacy/.terraform.lock.hcl b/inputs/gcp/cloud_vmware_engine/network/block_legacy/.terraform.lock.hcl index f19ce156d..5698484ba 100644 --- a/inputs/gcp/cloud_vmware_engine/network/block_legacy/.terraform.lock.hcl +++ b/inputs/gcp/cloud_vmware_engine/network/block_legacy/.terraform.lock.hcl @@ -2,21 +2,20 @@ # Manual edits may be lost in future updates. provider "registry.terraform.io/hashicorp/google" { - version = "6.8.0" - constraints = "6.8.0" + version = "7.16.0" hashes = [ - "h1:xdFVxNzvhzX8sbkMhmBhmViiyoc8PYbkaig6rgs0Ud0=", - "zh:1b78f4451f1617092eb6891c9c13eda79671060601c40947feea6794c732157a", - "zh:4c6d7231ce32c6ff2a98218ef363c133d27d423b009354e7fe18459d9feb41d4", - "zh:6ae0112e9c733ab6c72436a334ffe3f197a613bb04f49538462b83b236d37a2d", - "zh:8bd5651838ad674e0a173a453b76c80b94d08ebcb8ea0b6263ce6da0599b42f5", - "zh:94ee7bcd77b0b7c2777113e35282da014e61e813fe46c058a49bf3d616fecdf4", - "zh:c0bf014422c2971985d34ad45ddb6aa737373398f83b325884ea5608ac1264aa", - "zh:c2cbbf0c249c3d1842ad0ad77fb7ef85bd3e92c688618c4087173bc1d69cd098", - "zh:cefa3e06cb353d08b83dafa6135cd78e17540ae735b7c5687833cc1925c3fd8e", - "zh:d20bc0216bf7f054f6318467d3902ced05e9f0bfa500ee55bf43b1b41ef0b854", - "zh:e54ad5959e53b9e9acafc243d6f4039ab5005cec32c7435a122da964888d184c", - "zh:e833c8de147268b3ffc14c60915eccb9347ade5f25b37b3771240a4d68b6aac4", + "h1:o+dOw75zzgpJAUdjEa2a2T62OEThcEr52/4CymRAewA=", + "zh:1cd6f0926e5884998965675d3fbdc5e5abd7335d3f5f83571226be7f50f44443", + "zh:2bc3e3db662df08755af37d23c856f0ec3b8474f629f042ad3af228ff1c3cb5a", + "zh:41869013f786bff8c2ba35e203e84b6c3ec9ff623d6cea6796f5f0204719e907", + "zh:493213e16cb8de6a39b0d6b327faab7909f32ad973fb937d2b3bc4faa07c911a", + "zh:5e9df66ddeef9fcf77acd6185fe880e6b3725b98850ea3b47ef726c44dc04a71", + "zh:6b9e8f83316cf660549a4032342107bb41a7e549eba923f69aefa1ae5ab80a3f", + "zh:6da9316ca7c70d4997c4a62cd534f674e02888e351cb189f7b77b5a03e803773", + "zh:7d1b1dc7c04924dd203e9c5d2041fb732b1e2556b4041c9272a786d37924be7c", + "zh:86dcafef126ad72b592582d8fdb2591d8a2cb45ff85e5f5ff0ac76fbbd7be1bb", + "zh:8a8994c67297336ede3ded9d2558104d49de6fdfa85b88dc99b50030d68158cf", + "zh:a67d8b4774cdb45fb13e73e15885e229561a8b8f46d9f0069b81bf4d3ca03c4a", "zh:f569b65999264a9416862bca5cd2a6177d94ccb0424f3a4ef424428912b9cb3c", ] } diff --git a/inputs/gcp/cloud_vmware_engine/network/block_legacy/config.tf b/inputs/gcp/cloud_vmware_engine/network/block_legacy/config.tf new file mode 100644 index 000000000..05906d614 --- /dev/null +++ b/inputs/gcp/cloud_vmware_engine/network/block_legacy/config.tf @@ -0,0 +1,9 @@ +terraform { + required_providers { + google = { + source = "hashicorp/google" + } + } +} + +provider "google" {} \ No newline at end of file diff --git a/inputs/gcp/cloud_vmware_engine/network/block_legacy/plan b/inputs/gcp/cloud_vmware_engine/network/block_legacy/plan deleted file mode 100644 index 2a2699575..000000000 Binary files a/inputs/gcp/cloud_vmware_engine/network/block_legacy/plan and /dev/null differ diff --git a/inputs/gcp/cloud_vmware_engine/network/block_legacy/plan.json b/inputs/gcp/cloud_vmware_engine/network/block_legacy/plan.json deleted file mode 100644 index 6d79278cb..000000000 --- a/inputs/gcp/cloud_vmware_engine/network/block_legacy/plan.json +++ /dev/null @@ -1 +0,0 @@ -{"format_version":"1.2","terraform_version":"1.9.5","planned_values":{"root_module":{"resources":[{"address":"google_project.acceptance","mode":"managed","type":"google_project","name":"acceptance","provider_name":"registry.terraform.io/hashicorp/google","schema_version":1,"values":{"auto_create_network":true,"billing_account":"000000-0000000-0000000-000000","deletion_policy":"DELETE","effective_labels":{"goog-terraform-provisioned":"true"},"folder_id":null,"labels":null,"name":"vmw-proj","org_id":"123456789","project_id":"vmw-proj","tags":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"sensitive_values":{"effective_labels":{},"terraform_labels":{}}},{"address":"google_project.acceptance_nc","mode":"managed","type":"google_project","name":"acceptance_nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":1,"values":{"auto_create_network":true,"billing_account":"000000-0000000-0000000-000000","deletion_policy":"DELETE","effective_labels":{"goog-terraform-provisioned":"true"},"folder_id":null,"labels":null,"name":"vmw-proj","org_id":"123456789","project_id":"vmw-proj","tags":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"sensitive_values":{"effective_labels":{},"terraform_labels":{}}},{"address":"google_project_service.acceptance","mode":"managed","type":"google_project_service","name":"acceptance","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"disable_dependent_services":null,"disable_on_destroy":true,"project":"vmw-proj","service":"vmwareengine.googleapis.com","timeouts":null},"sensitive_values":{}},{"address":"google_project_service.acceptance_nc","mode":"managed","type":"google_project_service","name":"acceptance_nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"disable_dependent_services":null,"disable_on_destroy":true,"project":"vmw-proj","service":"vmwareengine.googleapis.com","timeouts":null},"sensitive_values":{}},{"address":"google_vmwareengine_network.c","mode":"managed","type":"google_vmwareengine_network","name":"c","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"description":"VMwareEngine legacy network sample","location":"australia-southeast2","name":"australia-southeast2-c-default","project":"vmw-proj","timeouts":null,"type":"STANDARD"},"sensitive_values":{"vpc_networks":[]}},{"address":"google_vmwareengine_network.nc","mode":"managed","type":"google_vmwareengine_network","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"description":"VMwareEngine legacy network sample","location":"us-west1","name":"us-west1-nc-default","project":"vmw-proj","timeouts":null,"type":"LEGACY"},"sensitive_values":{"vpc_networks":[]}}]}},"resource_changes":[{"address":"google_project.acceptance","mode":"managed","type":"google_project","name":"acceptance","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"auto_create_network":true,"billing_account":"000000-0000000-0000000-000000","deletion_policy":"DELETE","effective_labels":{"goog-terraform-provisioned":"true"},"folder_id":null,"labels":null,"name":"vmw-proj","org_id":"123456789","project_id":"vmw-proj","tags":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"after_unknown":{"effective_labels":{},"id":true,"number":true,"terraform_labels":{}},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"terraform_labels":{}}}},{"address":"google_project.acceptance_nc","mode":"managed","type":"google_project","name":"acceptance_nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"auto_create_network":true,"billing_account":"000000-0000000-0000000-000000","deletion_policy":"DELETE","effective_labels":{"goog-terraform-provisioned":"true"},"folder_id":null,"labels":null,"name":"vmw-proj","org_id":"123456789","project_id":"vmw-proj","tags":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"after_unknown":{"effective_labels":{},"id":true,"number":true,"terraform_labels":{}},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"terraform_labels":{}}}},{"address":"google_project_service.acceptance","mode":"managed","type":"google_project_service","name":"acceptance","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"disable_dependent_services":null,"disable_on_destroy":true,"project":"vmw-proj","service":"vmwareengine.googleapis.com","timeouts":null},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"google_project_service.acceptance_nc","mode":"managed","type":"google_project_service","name":"acceptance_nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"disable_dependent_services":null,"disable_on_destroy":true,"project":"vmw-proj","service":"vmwareengine.googleapis.com","timeouts":null},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"google_vmwareengine_network.c","mode":"managed","type":"google_vmwareengine_network","name":"c","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"description":"VMwareEngine legacy network sample","location":"australia-southeast2","name":"australia-southeast2-c-default","project":"vmw-proj","timeouts":null,"type":"STANDARD"},"after_unknown":{"id":true,"state":true,"uid":true,"vpc_networks":true},"before_sensitive":false,"after_sensitive":{"vpc_networks":[]}}},{"address":"google_vmwareengine_network.nc","mode":"managed","type":"google_vmwareengine_network","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"description":"VMwareEngine legacy network sample","location":"us-west1","name":"us-west1-nc-default","project":"vmw-proj","timeouts":null,"type":"LEGACY"},"after_unknown":{"id":true,"state":true,"uid":true,"vpc_networks":true},"before_sensitive":false,"after_sensitive":{"vpc_networks":[]}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google","version_constraint":"6.8.0"}},"root_module":{"resources":[{"address":"google_project.acceptance","mode":"managed","type":"google_project","name":"acceptance","provider_config_key":"google","expressions":{"billing_account":{"constant_value":"000000-0000000-0000000-000000"},"deletion_policy":{"constant_value":"DELETE"},"name":{"constant_value":"vmw-proj"},"org_id":{"constant_value":"123456789"},"project_id":{"constant_value":"vmw-proj"}},"schema_version":1},{"address":"google_project.acceptance_nc","mode":"managed","type":"google_project","name":"acceptance_nc","provider_config_key":"google","expressions":{"billing_account":{"constant_value":"000000-0000000-0000000-000000"},"deletion_policy":{"constant_value":"DELETE"},"name":{"constant_value":"vmw-proj"},"org_id":{"constant_value":"123456789"},"project_id":{"constant_value":"vmw-proj"}},"schema_version":1},{"address":"google_project_service.acceptance","mode":"managed","type":"google_project_service","name":"acceptance","provider_config_key":"google","expressions":{"project":{"references":["google_project.acceptance.project_id","google_project.acceptance"]},"service":{"constant_value":"vmwareengine.googleapis.com"}},"schema_version":0},{"address":"google_project_service.acceptance_nc","mode":"managed","type":"google_project_service","name":"acceptance_nc","provider_config_key":"google","expressions":{"project":{"references":["google_project.acceptance_nc.project_id","google_project.acceptance_nc"]},"service":{"constant_value":"vmwareengine.googleapis.com"}},"schema_version":0},{"address":"google_vmwareengine_network.c","mode":"managed","type":"google_vmwareengine_network","name":"c","provider_config_key":"google","expressions":{"description":{"constant_value":"VMwareEngine legacy network sample"},"location":{"constant_value":"australia-southeast2"},"name":{"constant_value":"australia-southeast2-c-default"},"project":{"references":["google_project_service.acceptance.project","google_project_service.acceptance"]},"type":{"constant_value":"STANDARD"}},"schema_version":0},{"address":"google_vmwareengine_network.nc","mode":"managed","type":"google_vmwareengine_network","name":"nc","provider_config_key":"google","expressions":{"description":{"constant_value":"VMwareEngine legacy network sample"},"location":{"constant_value":"us-west1"},"name":{"constant_value":"us-west1-nc-default"},"project":{"references":["google_project_service.acceptance_nc.project","google_project_service.acceptance_nc"]},"type":{"constant_value":"LEGACY"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"google_project.acceptance","attribute":["project_id"]},{"resource":"google_project.acceptance_nc","attribute":["project_id"]},{"resource":"google_project_service.acceptance_nc","attribute":["project"]},{"resource":"google_project_service.acceptance","attribute":["project"]}],"timestamp":"2025-09-08T10:06:11Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/cloud_vmware_engine/network_peering/block_custom_routes/config.tf b/inputs/gcp/cloud_vmware_engine/network_peering/block_custom_routes/config.tf new file mode 100644 index 000000000..05906d614 --- /dev/null +++ b/inputs/gcp/cloud_vmware_engine/network_peering/block_custom_routes/config.tf @@ -0,0 +1,9 @@ +terraform { + required_providers { + google = { + source = "hashicorp/google" + } + } +} + +provider "google" {} \ No newline at end of file diff --git a/inputs/gcp/cloud_vmware_engine/network_peering/block_custom_routes/plan b/inputs/gcp/cloud_vmware_engine/network_peering/block_custom_routes/plan deleted file mode 100644 index a67a756e1..000000000 Binary files a/inputs/gcp/cloud_vmware_engine/network_peering/block_custom_routes/plan and /dev/null differ diff --git a/inputs/gcp/cloud_vmware_engine/network_peering/block_custom_routes/plan.json b/inputs/gcp/cloud_vmware_engine/network_peering/block_custom_routes/plan.json deleted file mode 100644 index 62ab86df7..000000000 --- a/inputs/gcp/cloud_vmware_engine/network_peering/block_custom_routes/plan.json +++ /dev/null @@ -1 +0,0 @@ -{"format_version":"1.2","terraform_version":"1.9.5","planned_values":{"root_module":{"resources":[{"address":"google_vmwareengine_network.network-peering-nw","mode":"managed","type":"google_vmwareengine_network","name":"network-peering-nw","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"description":null,"location":"global","name":"default-np-nw","project":"fake-project","timeouts":null,"type":"STANDARD"},"sensitive_values":{"vpc_networks":[]}},{"address":"google_vmwareengine_network.network-peering-nw_nc","mode":"managed","type":"google_vmwareengine_network","name":"network-peering-nw_nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"description":null,"location":"global","name":"default-np-nw","project":"fake-project","timeouts":null,"type":"STANDARD"},"sensitive_values":{"vpc_networks":[]}},{"address":"google_vmwareengine_network.network-peering-peer-nw","mode":"managed","type":"google_vmwareengine_network","name":"network-peering-peer-nw","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"description":null,"location":"global","name":"peer-np-nw","project":"fake-project","timeouts":null,"type":"STANDARD"},"sensitive_values":{"vpc_networks":[]}},{"address":"google_vmwareengine_network.network-peering-peer-nw_nc","mode":"managed","type":"google_vmwareengine_network","name":"network-peering-peer-nw_nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"description":null,"location":"global","name":"peer-np-nw","project":"fake-project","timeouts":null,"type":"STANDARD"},"sensitive_values":{"vpc_networks":[]}},{"address":"google_vmwareengine_network_peering.c","mode":"managed","type":"google_vmwareengine_network_peering","name":"c","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"description":null,"export_custom_routes":true,"export_custom_routes_with_public_ip":true,"import_custom_routes":true,"import_custom_routes_with_public_ip":false,"name":"sample-network-peering-c","peer_network_type":"VMWARE_ENGINE_NETWORK","project":"fake-project","timeouts":null},"sensitive_values":{}},{"address":"google_vmwareengine_network_peering.nc","mode":"managed","type":"google_vmwareengine_network_peering","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"description":"Sample description","export_custom_routes":true,"export_custom_routes_with_public_ip":true,"import_custom_routes":true,"import_custom_routes_with_public_ip":true,"name":"sample-network-peering-nc","peer_network_type":"THIRD_PARTY_SERVICE","project":"fake-project","timeouts":null},"sensitive_values":{}}]}},"resource_changes":[{"address":"google_vmwareengine_network.network-peering-nw","mode":"managed","type":"google_vmwareengine_network","name":"network-peering-nw","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"description":null,"location":"global","name":"default-np-nw","project":"fake-project","timeouts":null,"type":"STANDARD"},"after_unknown":{"id":true,"state":true,"uid":true,"vpc_networks":true},"before_sensitive":false,"after_sensitive":{"vpc_networks":[]}}},{"address":"google_vmwareengine_network.network-peering-nw_nc","mode":"managed","type":"google_vmwareengine_network","name":"network-peering-nw_nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"description":null,"location":"global","name":"default-np-nw","project":"fake-project","timeouts":null,"type":"STANDARD"},"after_unknown":{"id":true,"state":true,"uid":true,"vpc_networks":true},"before_sensitive":false,"after_sensitive":{"vpc_networks":[]}}},{"address":"google_vmwareengine_network.network-peering-peer-nw","mode":"managed","type":"google_vmwareengine_network","name":"network-peering-peer-nw","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"description":null,"location":"global","name":"peer-np-nw","project":"fake-project","timeouts":null,"type":"STANDARD"},"after_unknown":{"id":true,"state":true,"uid":true,"vpc_networks":true},"before_sensitive":false,"after_sensitive":{"vpc_networks":[]}}},{"address":"google_vmwareengine_network.network-peering-peer-nw_nc","mode":"managed","type":"google_vmwareengine_network","name":"network-peering-peer-nw_nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"description":null,"location":"global","name":"peer-np-nw","project":"fake-project","timeouts":null,"type":"STANDARD"},"after_unknown":{"id":true,"state":true,"uid":true,"vpc_networks":true},"before_sensitive":false,"after_sensitive":{"vpc_networks":[]}}},{"address":"google_vmwareengine_network_peering.c","mode":"managed","type":"google_vmwareengine_network_peering","name":"c","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"description":null,"export_custom_routes":true,"export_custom_routes_with_public_ip":true,"import_custom_routes":true,"import_custom_routes_with_public_ip":false,"name":"sample-network-peering-c","peer_network_type":"VMWARE_ENGINE_NETWORK","project":"fake-project","timeouts":null},"after_unknown":{"create_time":true,"id":true,"peer_network":true,"state":true,"state_details":true,"uid":true,"update_time":true,"vmware_engine_network":true,"vmware_engine_network_canonical":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"google_vmwareengine_network_peering.nc","mode":"managed","type":"google_vmwareengine_network_peering","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"description":"Sample description","export_custom_routes":true,"export_custom_routes_with_public_ip":true,"import_custom_routes":true,"import_custom_routes_with_public_ip":true,"name":"sample-network-peering-nc","peer_network_type":"THIRD_PARTY_SERVICE","project":"fake-project","timeouts":null},"after_unknown":{"create_time":true,"id":true,"peer_network":true,"state":true,"state_details":true,"uid":true,"update_time":true,"vmware_engine_network":true,"vmware_engine_network_canonical":true},"before_sensitive":false,"after_sensitive":{}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_vmwareengine_network.network-peering-nw","mode":"managed","type":"google_vmwareengine_network","name":"network-peering-nw","provider_config_key":"google","expressions":{"location":{"constant_value":"global"},"name":{"constant_value":"default-np-nw"},"type":{"constant_value":"STANDARD"}},"schema_version":0},{"address":"google_vmwareengine_network.network-peering-nw_nc","mode":"managed","type":"google_vmwareengine_network","name":"network-peering-nw_nc","provider_config_key":"google","expressions":{"location":{"constant_value":"global"},"name":{"constant_value":"default-np-nw"},"type":{"constant_value":"STANDARD"}},"schema_version":0},{"address":"google_vmwareengine_network.network-peering-peer-nw","mode":"managed","type":"google_vmwareengine_network","name":"network-peering-peer-nw","provider_config_key":"google","expressions":{"location":{"constant_value":"global"},"name":{"constant_value":"peer-np-nw"},"type":{"constant_value":"STANDARD"}},"schema_version":0},{"address":"google_vmwareengine_network.network-peering-peer-nw_nc","mode":"managed","type":"google_vmwareengine_network","name":"network-peering-peer-nw_nc","provider_config_key":"google","expressions":{"location":{"constant_value":"global"},"name":{"constant_value":"peer-np-nw"},"type":{"constant_value":"STANDARD"}},"schema_version":0},{"address":"google_vmwareengine_network_peering.c","mode":"managed","type":"google_vmwareengine_network_peering","name":"c","provider_config_key":"google","expressions":{"import_custom_routes_with_public_ip":{"constant_value":false},"name":{"constant_value":"sample-network-peering-c"},"peer_network":{"references":["google_vmwareengine_network.network-peering-peer-nw.id","google_vmwareengine_network.network-peering-peer-nw"]},"peer_network_type":{"constant_value":"VMWARE_ENGINE_NETWORK"},"vmware_engine_network":{"references":["google_vmwareengine_network.network-peering-nw.id","google_vmwareengine_network.network-peering-nw"]}},"schema_version":0},{"address":"google_vmwareengine_network_peering.nc","mode":"managed","type":"google_vmwareengine_network_peering","name":"nc","provider_config_key":"google","expressions":{"description":{"constant_value":"Sample description"},"import_custom_routes_with_public_ip":{"constant_value":true},"name":{"constant_value":"sample-network-peering-nc"},"peer_network":{"references":["google_vmwareengine_network.network-peering-peer-nw_nc.id","google_vmwareengine_network.network-peering-peer-nw_nc"]},"peer_network_type":{"constant_value":"THIRD_PARTY_SERVICE"},"vmware_engine_network":{"references":["google_vmwareengine_network.network-peering-nw_nc.id","google_vmwareengine_network.network-peering-nw_nc"]}},"schema_version":0}]}},"relevant_attributes":[{"resource":"google_vmwareengine_network.network-peering-nw","attribute":["id"]},{"resource":"google_vmwareengine_network.network-peering-peer-nw","attribute":["id"]},{"resource":"google_vmwareengine_network.network-peering-nw_nc","attribute":["id"]},{"resource":"google_vmwareengine_network.network-peering-peer-nw_nc","attribute":["id"]}],"timestamp":"2025-09-08T10:06:14Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/cloud_vmware_engine/network_peering/block_thirdparty/config.tf b/inputs/gcp/cloud_vmware_engine/network_peering/block_thirdparty/config.tf new file mode 100644 index 000000000..05906d614 --- /dev/null +++ b/inputs/gcp/cloud_vmware_engine/network_peering/block_thirdparty/config.tf @@ -0,0 +1,9 @@ +terraform { + required_providers { + google = { + source = "hashicorp/google" + } + } +} + +provider "google" {} \ No newline at end of file diff --git a/inputs/gcp/cloud_vmware_engine/network_peering/block_thirdparty/plan b/inputs/gcp/cloud_vmware_engine/network_peering/block_thirdparty/plan deleted file mode 100644 index 0e049afd5..000000000 Binary files a/inputs/gcp/cloud_vmware_engine/network_peering/block_thirdparty/plan and /dev/null differ diff --git a/inputs/gcp/cloud_vmware_engine/network_peering/block_thirdparty/plan.json b/inputs/gcp/cloud_vmware_engine/network_peering/block_thirdparty/plan.json deleted file mode 100644 index c5148e418..000000000 --- a/inputs/gcp/cloud_vmware_engine/network_peering/block_thirdparty/plan.json +++ /dev/null @@ -1 +0,0 @@ -{"format_version":"1.2","terraform_version":"1.9.5","planned_values":{"root_module":{"resources":[{"address":"google_vmwareengine_network.network-peering-nw","mode":"managed","type":"google_vmwareengine_network","name":"network-peering-nw","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"description":null,"location":"global","name":"default-np-nw","project":"fake-project","timeouts":null,"type":"STANDARD"},"sensitive_values":{"vpc_networks":[]}},{"address":"google_vmwareengine_network.network-peering-nw_nc","mode":"managed","type":"google_vmwareengine_network","name":"network-peering-nw_nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"description":null,"location":"global","name":"default-np-nw","project":"fake-project","timeouts":null,"type":"STANDARD"},"sensitive_values":{"vpc_networks":[]}},{"address":"google_vmwareengine_network.network-peering-peer-nw","mode":"managed","type":"google_vmwareengine_network","name":"network-peering-peer-nw","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"description":null,"location":"global","name":"peer-np-nw","project":"fake-project","timeouts":null,"type":"STANDARD"},"sensitive_values":{"vpc_networks":[]}},{"address":"google_vmwareengine_network.network-peering-peer-nw_nc","mode":"managed","type":"google_vmwareengine_network","name":"network-peering-peer-nw_nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"description":null,"location":"global","name":"peer-np-nw","project":"fake-project","timeouts":null,"type":"STANDARD"},"sensitive_values":{"vpc_networks":[]}},{"address":"google_vmwareengine_network_peering.c","mode":"managed","type":"google_vmwareengine_network_peering","name":"c","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"description":"Sample description","export_custom_routes":false,"export_custom_routes_with_public_ip":false,"import_custom_routes":false,"import_custom_routes_with_public_ip":false,"name":"sample-network-peering-c","peer_network_type":"VMWARE_ENGINE_NETWORK","project":"fake-project","timeouts":null},"sensitive_values":{}},{"address":"google_vmwareengine_network_peering.nc","mode":"managed","type":"google_vmwareengine_network_peering","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"description":"Sample description","export_custom_routes":false,"export_custom_routes_with_public_ip":false,"import_custom_routes":false,"import_custom_routes_with_public_ip":false,"name":"sample-network-peering-nc","peer_network_type":"THIRD_PARTY_SERVICE","project":"fake-project","timeouts":null},"sensitive_values":{}}]}},"resource_changes":[{"address":"google_vmwareengine_network.network-peering-nw","mode":"managed","type":"google_vmwareengine_network","name":"network-peering-nw","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"description":null,"location":"global","name":"default-np-nw","project":"fake-project","timeouts":null,"type":"STANDARD"},"after_unknown":{"id":true,"state":true,"uid":true,"vpc_networks":true},"before_sensitive":false,"after_sensitive":{"vpc_networks":[]}}},{"address":"google_vmwareengine_network.network-peering-nw_nc","mode":"managed","type":"google_vmwareengine_network","name":"network-peering-nw_nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"description":null,"location":"global","name":"default-np-nw","project":"fake-project","timeouts":null,"type":"STANDARD"},"after_unknown":{"id":true,"state":true,"uid":true,"vpc_networks":true},"before_sensitive":false,"after_sensitive":{"vpc_networks":[]}}},{"address":"google_vmwareengine_network.network-peering-peer-nw","mode":"managed","type":"google_vmwareengine_network","name":"network-peering-peer-nw","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"description":null,"location":"global","name":"peer-np-nw","project":"fake-project","timeouts":null,"type":"STANDARD"},"after_unknown":{"id":true,"state":true,"uid":true,"vpc_networks":true},"before_sensitive":false,"after_sensitive":{"vpc_networks":[]}}},{"address":"google_vmwareengine_network.network-peering-peer-nw_nc","mode":"managed","type":"google_vmwareengine_network","name":"network-peering-peer-nw_nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"description":null,"location":"global","name":"peer-np-nw","project":"fake-project","timeouts":null,"type":"STANDARD"},"after_unknown":{"id":true,"state":true,"uid":true,"vpc_networks":true},"before_sensitive":false,"after_sensitive":{"vpc_networks":[]}}},{"address":"google_vmwareengine_network_peering.c","mode":"managed","type":"google_vmwareengine_network_peering","name":"c","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"description":"Sample description","export_custom_routes":false,"export_custom_routes_with_public_ip":false,"import_custom_routes":false,"import_custom_routes_with_public_ip":false,"name":"sample-network-peering-c","peer_network_type":"VMWARE_ENGINE_NETWORK","project":"fake-project","timeouts":null},"after_unknown":{"create_time":true,"id":true,"peer_network":true,"state":true,"state_details":true,"uid":true,"update_time":true,"vmware_engine_network":true,"vmware_engine_network_canonical":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"google_vmwareengine_network_peering.nc","mode":"managed","type":"google_vmwareengine_network_peering","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"description":"Sample description","export_custom_routes":false,"export_custom_routes_with_public_ip":false,"import_custom_routes":false,"import_custom_routes_with_public_ip":false,"name":"sample-network-peering-nc","peer_network_type":"THIRD_PARTY_SERVICE","project":"fake-project","timeouts":null},"after_unknown":{"create_time":true,"id":true,"peer_network":true,"state":true,"state_details":true,"uid":true,"update_time":true,"vmware_engine_network":true,"vmware_engine_network_canonical":true},"before_sensitive":false,"after_sensitive":{}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_vmwareengine_network.network-peering-nw","mode":"managed","type":"google_vmwareengine_network","name":"network-peering-nw","provider_config_key":"google","expressions":{"location":{"constant_value":"global"},"name":{"constant_value":"default-np-nw"},"type":{"constant_value":"STANDARD"}},"schema_version":0},{"address":"google_vmwareengine_network.network-peering-nw_nc","mode":"managed","type":"google_vmwareengine_network","name":"network-peering-nw_nc","provider_config_key":"google","expressions":{"location":{"constant_value":"global"},"name":{"constant_value":"default-np-nw"},"type":{"constant_value":"STANDARD"}},"schema_version":0},{"address":"google_vmwareengine_network.network-peering-peer-nw","mode":"managed","type":"google_vmwareengine_network","name":"network-peering-peer-nw","provider_config_key":"google","expressions":{"location":{"constant_value":"global"},"name":{"constant_value":"peer-np-nw"},"type":{"constant_value":"STANDARD"}},"schema_version":0},{"address":"google_vmwareengine_network.network-peering-peer-nw_nc","mode":"managed","type":"google_vmwareengine_network","name":"network-peering-peer-nw_nc","provider_config_key":"google","expressions":{"location":{"constant_value":"global"},"name":{"constant_value":"peer-np-nw"},"type":{"constant_value":"STANDARD"}},"schema_version":0},{"address":"google_vmwareengine_network_peering.c","mode":"managed","type":"google_vmwareengine_network_peering","name":"c","provider_config_key":"google","expressions":{"description":{"constant_value":"Sample description"},"export_custom_routes":{"constant_value":false},"export_custom_routes_with_public_ip":{"constant_value":false},"import_custom_routes":{"constant_value":false},"import_custom_routes_with_public_ip":{"constant_value":false},"name":{"constant_value":"sample-network-peering-c"},"peer_network":{"references":["google_vmwareengine_network.network-peering-peer-nw.id","google_vmwareengine_network.network-peering-peer-nw"]},"peer_network_type":{"constant_value":"VMWARE_ENGINE_NETWORK"},"vmware_engine_network":{"references":["google_vmwareengine_network.network-peering-nw.id","google_vmwareengine_network.network-peering-nw"]}},"schema_version":0},{"address":"google_vmwareengine_network_peering.nc","mode":"managed","type":"google_vmwareengine_network_peering","name":"nc","provider_config_key":"google","expressions":{"description":{"constant_value":"Sample description"},"export_custom_routes":{"constant_value":false},"export_custom_routes_with_public_ip":{"constant_value":false},"import_custom_routes":{"constant_value":false},"import_custom_routes_with_public_ip":{"constant_value":false},"name":{"constant_value":"sample-network-peering-nc"},"peer_network":{"references":["google_vmwareengine_network.network-peering-peer-nw_nc.id","google_vmwareengine_network.network-peering-peer-nw_nc"]},"peer_network_type":{"constant_value":"THIRD_PARTY_SERVICE"},"vmware_engine_network":{"references":["google_vmwareengine_network.network-peering-nw_nc.id","google_vmwareengine_network.network-peering-nw_nc"]}},"schema_version":0}]}},"relevant_attributes":[{"resource":"google_vmwareengine_network.network-peering-peer-nw","attribute":["id"]},{"resource":"google_vmwareengine_network.network-peering-nw","attribute":["id"]},{"resource":"google_vmwareengine_network.network-peering-nw_nc","attribute":["id"]},{"resource":"google_vmwareengine_network.network-peering-peer-nw_nc","attribute":["id"]}],"timestamp":"2025-09-08T10:06:16Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/cloud_vmware_engine/network_policy/allowed_location/.terraform.lock.hcl b/inputs/gcp/cloud_vmware_engine/network_policy/allowed_location/.terraform.lock.hcl index f19ce156d..5698484ba 100644 --- a/inputs/gcp/cloud_vmware_engine/network_policy/allowed_location/.terraform.lock.hcl +++ b/inputs/gcp/cloud_vmware_engine/network_policy/allowed_location/.terraform.lock.hcl @@ -2,21 +2,20 @@ # Manual edits may be lost in future updates. provider "registry.terraform.io/hashicorp/google" { - version = "6.8.0" - constraints = "6.8.0" + version = "7.16.0" hashes = [ - "h1:xdFVxNzvhzX8sbkMhmBhmViiyoc8PYbkaig6rgs0Ud0=", - "zh:1b78f4451f1617092eb6891c9c13eda79671060601c40947feea6794c732157a", - "zh:4c6d7231ce32c6ff2a98218ef363c133d27d423b009354e7fe18459d9feb41d4", - "zh:6ae0112e9c733ab6c72436a334ffe3f197a613bb04f49538462b83b236d37a2d", - "zh:8bd5651838ad674e0a173a453b76c80b94d08ebcb8ea0b6263ce6da0599b42f5", - "zh:94ee7bcd77b0b7c2777113e35282da014e61e813fe46c058a49bf3d616fecdf4", - "zh:c0bf014422c2971985d34ad45ddb6aa737373398f83b325884ea5608ac1264aa", - "zh:c2cbbf0c249c3d1842ad0ad77fb7ef85bd3e92c688618c4087173bc1d69cd098", - "zh:cefa3e06cb353d08b83dafa6135cd78e17540ae735b7c5687833cc1925c3fd8e", - "zh:d20bc0216bf7f054f6318467d3902ced05e9f0bfa500ee55bf43b1b41ef0b854", - "zh:e54ad5959e53b9e9acafc243d6f4039ab5005cec32c7435a122da964888d184c", - "zh:e833c8de147268b3ffc14c60915eccb9347ade5f25b37b3771240a4d68b6aac4", + "h1:o+dOw75zzgpJAUdjEa2a2T62OEThcEr52/4CymRAewA=", + "zh:1cd6f0926e5884998965675d3fbdc5e5abd7335d3f5f83571226be7f50f44443", + "zh:2bc3e3db662df08755af37d23c856f0ec3b8474f629f042ad3af228ff1c3cb5a", + "zh:41869013f786bff8c2ba35e203e84b6c3ec9ff623d6cea6796f5f0204719e907", + "zh:493213e16cb8de6a39b0d6b327faab7909f32ad973fb937d2b3bc4faa07c911a", + "zh:5e9df66ddeef9fcf77acd6185fe880e6b3725b98850ea3b47ef726c44dc04a71", + "zh:6b9e8f83316cf660549a4032342107bb41a7e549eba923f69aefa1ae5ab80a3f", + "zh:6da9316ca7c70d4997c4a62cd534f674e02888e351cb189f7b77b5a03e803773", + "zh:7d1b1dc7c04924dd203e9c5d2041fb732b1e2556b4041c9272a786d37924be7c", + "zh:86dcafef126ad72b592582d8fdb2591d8a2cb45ff85e5f5ff0ac76fbbd7be1bb", + "zh:8a8994c67297336ede3ded9d2558104d49de6fdfa85b88dc99b50030d68158cf", + "zh:a67d8b4774cdb45fb13e73e15885e229561a8b8f46d9f0069b81bf4d3ca03c4a", "zh:f569b65999264a9416862bca5cd2a6177d94ccb0424f3a4ef424428912b9cb3c", ] } diff --git a/inputs/gcp/cloud_vmware_engine/network_policy/allowed_location/config.tf b/inputs/gcp/cloud_vmware_engine/network_policy/allowed_location/config.tf new file mode 100644 index 000000000..05906d614 --- /dev/null +++ b/inputs/gcp/cloud_vmware_engine/network_policy/allowed_location/config.tf @@ -0,0 +1,9 @@ +terraform { + required_providers { + google = { + source = "hashicorp/google" + } + } +} + +provider "google" {} \ No newline at end of file diff --git a/inputs/gcp/cloud_vmware_engine/network_policy/allowed_location/plan b/inputs/gcp/cloud_vmware_engine/network_policy/allowed_location/plan deleted file mode 100644 index 8221815f2..000000000 Binary files a/inputs/gcp/cloud_vmware_engine/network_policy/allowed_location/plan and /dev/null differ diff --git a/inputs/gcp/cloud_vmware_engine/network_policy/allowed_location/plan.json b/inputs/gcp/cloud_vmware_engine/network_policy/allowed_location/plan.json deleted file mode 100644 index 447d498b8..000000000 --- a/inputs/gcp/cloud_vmware_engine/network_policy/allowed_location/plan.json +++ /dev/null @@ -1 +0,0 @@ -{"format_version":"1.2","terraform_version":"1.9.5","planned_values":{"root_module":{"resources":[{"address":"google_vmwareengine_network.network-policy-nw","mode":"managed","type":"google_vmwareengine_network","name":"network-policy-nw","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"description":"VMwareEngine standard network sample","location":"global","name":"sample-network","project":"fake-project","timeouts":null,"type":"STANDARD"},"sensitive_values":{"vpc_networks":[]}},{"address":"google_vmwareengine_network.network-policy-nw_nc","mode":"managed","type":"google_vmwareengine_network","name":"network-policy-nw_nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"description":"VMwareEngine standard network sample","location":"global","name":"sample-network","project":"fake-project","timeouts":null,"type":"STANDARD"},"sensitive_values":{"vpc_networks":[]}},{"address":"google_vmwareengine_network_policy.c","mode":"managed","type":"google_vmwareengine_network_policy","name":"c","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"description":null,"edge_services_cidr":"192.168.30.0/26","location":"australia-southeast1","name":"sample-network-policy-c","project":"fake-project","timeouts":null},"sensitive_values":{"external_ip":[],"internet_access":[]}},{"address":"google_vmwareengine_network_policy.nc","mode":"managed","type":"google_vmwareengine_network_policy","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"description":null,"edge_services_cidr":"192.168.30.0/26","location":"us-east1","name":"sample-network-policy-nc","project":"fake-project","timeouts":null},"sensitive_values":{"external_ip":[],"internet_access":[]}}]}},"resource_changes":[{"address":"google_vmwareengine_network.network-policy-nw","mode":"managed","type":"google_vmwareengine_network","name":"network-policy-nw","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"description":"VMwareEngine standard network sample","location":"global","name":"sample-network","project":"fake-project","timeouts":null,"type":"STANDARD"},"after_unknown":{"id":true,"state":true,"uid":true,"vpc_networks":true},"before_sensitive":false,"after_sensitive":{"vpc_networks":[]}}},{"address":"google_vmwareengine_network.network-policy-nw_nc","mode":"managed","type":"google_vmwareengine_network","name":"network-policy-nw_nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"description":"VMwareEngine standard network sample","location":"global","name":"sample-network","project":"fake-project","timeouts":null,"type":"STANDARD"},"after_unknown":{"id":true,"state":true,"uid":true,"vpc_networks":true},"before_sensitive":false,"after_sensitive":{"vpc_networks":[]}}},{"address":"google_vmwareengine_network_policy.c","mode":"managed","type":"google_vmwareengine_network_policy","name":"c","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"description":null,"edge_services_cidr":"192.168.30.0/26","location":"australia-southeast1","name":"sample-network-policy-c","project":"fake-project","timeouts":null},"after_unknown":{"create_time":true,"external_ip":true,"id":true,"internet_access":true,"uid":true,"update_time":true,"vmware_engine_network":true,"vmware_engine_network_canonical":true},"before_sensitive":false,"after_sensitive":{"external_ip":[],"internet_access":[]}}},{"address":"google_vmwareengine_network_policy.nc","mode":"managed","type":"google_vmwareengine_network_policy","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"description":null,"edge_services_cidr":"192.168.30.0/26","location":"us-east1","name":"sample-network-policy-nc","project":"fake-project","timeouts":null},"after_unknown":{"create_time":true,"external_ip":true,"id":true,"internet_access":true,"uid":true,"update_time":true,"vmware_engine_network":true,"vmware_engine_network_canonical":true},"before_sensitive":false,"after_sensitive":{"external_ip":[],"internet_access":[]}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_vmwareengine_network.network-policy-nw","mode":"managed","type":"google_vmwareengine_network","name":"network-policy-nw","provider_config_key":"google","expressions":{"description":{"constant_value":"VMwareEngine standard network sample"},"location":{"constant_value":"global"},"name":{"constant_value":"sample-network"},"type":{"constant_value":"STANDARD"}},"schema_version":0},{"address":"google_vmwareengine_network.network-policy-nw_nc","mode":"managed","type":"google_vmwareengine_network","name":"network-policy-nw_nc","provider_config_key":"google","expressions":{"description":{"constant_value":"VMwareEngine standard network sample"},"location":{"constant_value":"global"},"name":{"constant_value":"sample-network"},"type":{"constant_value":"STANDARD"}},"schema_version":0},{"address":"google_vmwareengine_network_policy.c","mode":"managed","type":"google_vmwareengine_network_policy","name":"c","provider_config_key":"google","expressions":{"edge_services_cidr":{"constant_value":"192.168.30.0/26"},"location":{"constant_value":"australia-southeast1"},"name":{"constant_value":"sample-network-policy-c"},"vmware_engine_network":{"references":["google_vmwareengine_network.network-policy-nw.id","google_vmwareengine_network.network-policy-nw"]}},"schema_version":0},{"address":"google_vmwareengine_network_policy.nc","mode":"managed","type":"google_vmwareengine_network_policy","name":"nc","provider_config_key":"google","expressions":{"edge_services_cidr":{"constant_value":"192.168.30.0/26"},"location":{"constant_value":"us-east1"},"name":{"constant_value":"sample-network-policy-nc"},"vmware_engine_network":{"references":["google_vmwareengine_network.network-policy-nw_nc.id","google_vmwareengine_network.network-policy-nw_nc"]}},"schema_version":0}]}},"relevant_attributes":[{"resource":"google_vmwareengine_network.network-policy-nw_nc","attribute":["id"]},{"resource":"google_vmwareengine_network.network-policy-nw","attribute":["id"]}],"timestamp":"2025-09-08T10:06:17Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/cloud_vmware_engine/network_policy/block_external_ip/config.tf b/inputs/gcp/cloud_vmware_engine/network_policy/block_external_ip/config.tf new file mode 100644 index 000000000..05906d614 --- /dev/null +++ b/inputs/gcp/cloud_vmware_engine/network_policy/block_external_ip/config.tf @@ -0,0 +1,9 @@ +terraform { + required_providers { + google = { + source = "hashicorp/google" + } + } +} + +provider "google" {} \ No newline at end of file diff --git a/inputs/gcp/cloud_vmware_engine/network_policy/block_external_ip/plan b/inputs/gcp/cloud_vmware_engine/network_policy/block_external_ip/plan deleted file mode 100644 index ade26e515..000000000 Binary files a/inputs/gcp/cloud_vmware_engine/network_policy/block_external_ip/plan and /dev/null differ diff --git a/inputs/gcp/cloud_vmware_engine/network_policy/block_external_ip/plan.json b/inputs/gcp/cloud_vmware_engine/network_policy/block_external_ip/plan.json deleted file mode 100644 index 8d32ced2d..000000000 --- a/inputs/gcp/cloud_vmware_engine/network_policy/block_external_ip/plan.json +++ /dev/null @@ -1 +0,0 @@ -{"format_version":"1.2","terraform_version":"1.9.5","planned_values":{"root_module":{"resources":[{"address":"google_vmwareengine_network.network-policy-nw","mode":"managed","type":"google_vmwareengine_network","name":"network-policy-nw","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"description":"VMwareEngine standard network sample","location":"global","name":"sample-network","project":"fake-project","timeouts":null,"type":"STANDARD"},"sensitive_values":{"vpc_networks":[]}},{"address":"google_vmwareengine_network.network-policy-nw_nc","mode":"managed","type":"google_vmwareengine_network","name":"network-policy-nw_nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"description":"VMwareEngine standard network sample","location":"global","name":"sample-network","project":"fake-project","timeouts":null,"type":"STANDARD"},"sensitive_values":{"vpc_networks":[]}},{"address":"google_vmwareengine_network_policy.c","mode":"managed","type":"google_vmwareengine_network_policy","name":"c","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"description":"Sample Network Policy","edge_services_cidr":"192.168.30.0/26","external_ip":[{"enabled":false}],"internet_access":[{"enabled":true}],"location":"us-west1","name":"sample-network-policy-c","project":"fake-project","timeouts":null},"sensitive_values":{"external_ip":[{}],"internet_access":[{}]}},{"address":"google_vmwareengine_network_policy.nc","mode":"managed","type":"google_vmwareengine_network_policy","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"description":"Sample Network Policy","edge_services_cidr":"192.168.30.0/26","external_ip":[{"enabled":true}],"internet_access":[{"enabled":true}],"location":"us-west1","name":"sample-network-policy-nc","project":"fake-project","timeouts":null},"sensitive_values":{"external_ip":[{}],"internet_access":[{}]}}]}},"resource_changes":[{"address":"google_vmwareengine_network.network-policy-nw","mode":"managed","type":"google_vmwareengine_network","name":"network-policy-nw","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"description":"VMwareEngine standard network sample","location":"global","name":"sample-network","project":"fake-project","timeouts":null,"type":"STANDARD"},"after_unknown":{"id":true,"state":true,"uid":true,"vpc_networks":true},"before_sensitive":false,"after_sensitive":{"vpc_networks":[]}}},{"address":"google_vmwareengine_network.network-policy-nw_nc","mode":"managed","type":"google_vmwareengine_network","name":"network-policy-nw_nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"description":"VMwareEngine standard network sample","location":"global","name":"sample-network","project":"fake-project","timeouts":null,"type":"STANDARD"},"after_unknown":{"id":true,"state":true,"uid":true,"vpc_networks":true},"before_sensitive":false,"after_sensitive":{"vpc_networks":[]}}},{"address":"google_vmwareengine_network_policy.c","mode":"managed","type":"google_vmwareengine_network_policy","name":"c","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"description":"Sample Network Policy","edge_services_cidr":"192.168.30.0/26","external_ip":[{"enabled":false}],"internet_access":[{"enabled":true}],"location":"us-west1","name":"sample-network-policy-c","project":"fake-project","timeouts":null},"after_unknown":{"create_time":true,"external_ip":[{"state":true}],"id":true,"internet_access":[{"state":true}],"uid":true,"update_time":true,"vmware_engine_network":true,"vmware_engine_network_canonical":true},"before_sensitive":false,"after_sensitive":{"external_ip":[{}],"internet_access":[{}]}}},{"address":"google_vmwareengine_network_policy.nc","mode":"managed","type":"google_vmwareengine_network_policy","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"description":"Sample Network Policy","edge_services_cidr":"192.168.30.0/26","external_ip":[{"enabled":true}],"internet_access":[{"enabled":true}],"location":"us-west1","name":"sample-network-policy-nc","project":"fake-project","timeouts":null},"after_unknown":{"create_time":true,"external_ip":[{"state":true}],"id":true,"internet_access":[{"state":true}],"uid":true,"update_time":true,"vmware_engine_network":true,"vmware_engine_network_canonical":true},"before_sensitive":false,"after_sensitive":{"external_ip":[{}],"internet_access":[{}]}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_vmwareengine_network.network-policy-nw","mode":"managed","type":"google_vmwareengine_network","name":"network-policy-nw","provider_config_key":"google","expressions":{"description":{"constant_value":"VMwareEngine standard network sample"},"location":{"constant_value":"global"},"name":{"constant_value":"sample-network"},"type":{"constant_value":"STANDARD"}},"schema_version":0},{"address":"google_vmwareengine_network.network-policy-nw_nc","mode":"managed","type":"google_vmwareengine_network","name":"network-policy-nw_nc","provider_config_key":"google","expressions":{"description":{"constant_value":"VMwareEngine standard network sample"},"location":{"constant_value":"global"},"name":{"constant_value":"sample-network"},"type":{"constant_value":"STANDARD"}},"schema_version":0},{"address":"google_vmwareengine_network_policy.c","mode":"managed","type":"google_vmwareengine_network_policy","name":"c","provider_config_key":"google","expressions":{"description":{"constant_value":"Sample Network Policy"},"edge_services_cidr":{"constant_value":"192.168.30.0/26"},"external_ip":[{"enabled":{"constant_value":false}}],"internet_access":[{"enabled":{"constant_value":true}}],"location":{"constant_value":"us-west1"},"name":{"constant_value":"sample-network-policy-c"},"vmware_engine_network":{"references":["google_vmwareengine_network.network-policy-nw.id","google_vmwareengine_network.network-policy-nw"]}},"schema_version":0},{"address":"google_vmwareengine_network_policy.nc","mode":"managed","type":"google_vmwareengine_network_policy","name":"nc","provider_config_key":"google","expressions":{"description":{"constant_value":"Sample Network Policy"},"edge_services_cidr":{"constant_value":"192.168.30.0/26"},"external_ip":[{"enabled":{"constant_value":true}}],"internet_access":[{"enabled":{"constant_value":true}}],"location":{"constant_value":"us-west1"},"name":{"constant_value":"sample-network-policy-nc"},"vmware_engine_network":{"references":["google_vmwareengine_network.network-policy-nw_nc.id","google_vmwareengine_network.network-policy-nw_nc"]}},"schema_version":0}]}},"relevant_attributes":[{"resource":"google_vmwareengine_network.network-policy-nw_nc","attribute":["id"]},{"resource":"google_vmwareengine_network.network-policy-nw","attribute":["id"]}],"timestamp":"2025-09-08T10:06:19Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/cloud_vmware_engine/network_policy/block_internet_access/plan b/inputs/gcp/cloud_vmware_engine/network_policy/block_internet_access/plan deleted file mode 100644 index d90cb978e..000000000 Binary files a/inputs/gcp/cloud_vmware_engine/network_policy/block_internet_access/plan and /dev/null differ diff --git a/inputs/gcp/cloud_vmware_engine/network_policy/block_internet_access/plan.json b/inputs/gcp/cloud_vmware_engine/network_policy/block_internet_access/plan.json deleted file mode 100644 index 41700366c..000000000 --- a/inputs/gcp/cloud_vmware_engine/network_policy/block_internet_access/plan.json +++ /dev/null @@ -1 +0,0 @@ -{"format_version":"1.2","terraform_version":"1.9.5","planned_values":{"root_module":{"resources":[{"address":"google_vmwareengine_network.network-policy-nw","mode":"managed","type":"google_vmwareengine_network","name":"network-policy-nw","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"description":"VMwareEngine standard network sample","location":"global","name":"sample-network","project":"fake-project","timeouts":null,"type":"STANDARD"},"sensitive_values":{"vpc_networks":[]}},{"address":"google_vmwareengine_network.network-policy-nw_nc","mode":"managed","type":"google_vmwareengine_network","name":"network-policy-nw_nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"description":"VMwareEngine standard network sample","location":"global","name":"sample-network","project":"fake-project","timeouts":null,"type":"STANDARD"},"sensitive_values":{"vpc_networks":[]}},{"address":"google_vmwareengine_network_policy.c","mode":"managed","type":"google_vmwareengine_network_policy","name":"c","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"description":"Sample Network Policy","edge_services_cidr":"192.168.30.0/26","external_ip":[{"enabled":false}],"internet_access":[{"enabled":false}],"location":"us-west1","name":"sample-network-policy-c","project":"fake-project","timeouts":null},"sensitive_values":{"external_ip":[{}],"internet_access":[{}]}},{"address":"google_vmwareengine_network_policy.nc","mode":"managed","type":"google_vmwareengine_network_policy","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"description":"Sample Network Policy","edge_services_cidr":"192.168.30.0/26","external_ip":[{"enabled":true}],"internet_access":[{"enabled":true}],"location":"us-west1","name":"sample-network-policy-nc","project":"fake-project","timeouts":null},"sensitive_values":{"external_ip":[{}],"internet_access":[{}]}}]}},"resource_changes":[{"address":"google_vmwareengine_network.network-policy-nw","mode":"managed","type":"google_vmwareengine_network","name":"network-policy-nw","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"description":"VMwareEngine standard network sample","location":"global","name":"sample-network","project":"fake-project","timeouts":null,"type":"STANDARD"},"after_unknown":{"id":true,"state":true,"uid":true,"vpc_networks":true},"before_sensitive":false,"after_sensitive":{"vpc_networks":[]}}},{"address":"google_vmwareengine_network.network-policy-nw_nc","mode":"managed","type":"google_vmwareengine_network","name":"network-policy-nw_nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"description":"VMwareEngine standard network sample","location":"global","name":"sample-network","project":"fake-project","timeouts":null,"type":"STANDARD"},"after_unknown":{"id":true,"state":true,"uid":true,"vpc_networks":true},"before_sensitive":false,"after_sensitive":{"vpc_networks":[]}}},{"address":"google_vmwareengine_network_policy.c","mode":"managed","type":"google_vmwareengine_network_policy","name":"c","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"description":"Sample Network Policy","edge_services_cidr":"192.168.30.0/26","external_ip":[{"enabled":false}],"internet_access":[{"enabled":false}],"location":"us-west1","name":"sample-network-policy-c","project":"fake-project","timeouts":null},"after_unknown":{"create_time":true,"external_ip":[{"state":true}],"id":true,"internet_access":[{"state":true}],"uid":true,"update_time":true,"vmware_engine_network":true,"vmware_engine_network_canonical":true},"before_sensitive":false,"after_sensitive":{"external_ip":[{}],"internet_access":[{}]}}},{"address":"google_vmwareengine_network_policy.nc","mode":"managed","type":"google_vmwareengine_network_policy","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"description":"Sample Network Policy","edge_services_cidr":"192.168.30.0/26","external_ip":[{"enabled":true}],"internet_access":[{"enabled":true}],"location":"us-west1","name":"sample-network-policy-nc","project":"fake-project","timeouts":null},"after_unknown":{"create_time":true,"external_ip":[{"state":true}],"id":true,"internet_access":[{"state":true}],"uid":true,"update_time":true,"vmware_engine_network":true,"vmware_engine_network_canonical":true},"before_sensitive":false,"after_sensitive":{"external_ip":[{}],"internet_access":[{}]}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_vmwareengine_network.network-policy-nw","mode":"managed","type":"google_vmwareengine_network","name":"network-policy-nw","provider_config_key":"google","expressions":{"description":{"constant_value":"VMwareEngine standard network sample"},"location":{"constant_value":"global"},"name":{"constant_value":"sample-network"},"type":{"constant_value":"STANDARD"}},"schema_version":0},{"address":"google_vmwareengine_network.network-policy-nw_nc","mode":"managed","type":"google_vmwareengine_network","name":"network-policy-nw_nc","provider_config_key":"google","expressions":{"description":{"constant_value":"VMwareEngine standard network sample"},"location":{"constant_value":"global"},"name":{"constant_value":"sample-network"},"type":{"constant_value":"STANDARD"}},"schema_version":0},{"address":"google_vmwareengine_network_policy.c","mode":"managed","type":"google_vmwareengine_network_policy","name":"c","provider_config_key":"google","expressions":{"description":{"constant_value":"Sample Network Policy"},"edge_services_cidr":{"constant_value":"192.168.30.0/26"},"external_ip":[{"enabled":{"constant_value":false}}],"internet_access":[{"enabled":{"constant_value":false}}],"location":{"constant_value":"us-west1"},"name":{"constant_value":"sample-network-policy-c"},"vmware_engine_network":{"references":["google_vmwareengine_network.network-policy-nw.id","google_vmwareengine_network.network-policy-nw"]}},"schema_version":0},{"address":"google_vmwareengine_network_policy.nc","mode":"managed","type":"google_vmwareengine_network_policy","name":"nc","provider_config_key":"google","expressions":{"description":{"constant_value":"Sample Network Policy"},"edge_services_cidr":{"constant_value":"192.168.30.0/26"},"external_ip":[{"enabled":{"constant_value":true}}],"internet_access":[{"enabled":{"constant_value":true}}],"location":{"constant_value":"us-west1"},"name":{"constant_value":"sample-network-policy-nc"},"vmware_engine_network":{"references":["google_vmwareengine_network.network-policy-nw_nc.id","google_vmwareengine_network.network-policy-nw_nc"]}},"schema_version":0}]}},"relevant_attributes":[{"resource":"google_vmwareengine_network.network-policy-nw_nc","attribute":["id"]},{"resource":"google_vmwareengine_network.network-policy-nw","attribute":["id"]}],"timestamp":"2025-09-08T10:06:21Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/cloud_vmware_engine/private_cloud/allowed_location/plan b/inputs/gcp/cloud_vmware_engine/private_cloud/allowed_location/plan deleted file mode 100644 index 6776ff20a..000000000 Binary files a/inputs/gcp/cloud_vmware_engine/private_cloud/allowed_location/plan and /dev/null differ diff --git a/inputs/gcp/cloud_vmware_engine/private_cloud/allowed_location/plan.json b/inputs/gcp/cloud_vmware_engine/private_cloud/allowed_location/plan.json deleted file mode 100644 index 6c6016286..000000000 --- a/inputs/gcp/cloud_vmware_engine/private_cloud/allowed_location/plan.json +++ /dev/null @@ -1 +0,0 @@ -{"format_version":"1.2","terraform_version":"1.9.5","planned_values":{"root_module":{"resources":[{"address":"google_vmwareengine_network.pc-nw","mode":"managed","type":"google_vmwareengine_network","name":"pc-nw","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"description":"PC network description.","location":"global","name":"pc-nw","project":"fake-project","timeouts":null,"type":"STANDARD"},"sensitive_values":{"vpc_networks":[]}},{"address":"google_vmwareengine_network.pc-nw_nc","mode":"managed","type":"google_vmwareengine_network","name":"pc-nw_nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"description":"PC network description.","location":"global","name":"pc-nw","project":"fake-project","timeouts":null,"type":"STANDARD"},"sensitive_values":{"vpc_networks":[]}},{"address":"google_vmwareengine_private_cloud.c","mode":"managed","type":"google_vmwareengine_private_cloud","name":"c","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"deletion_delay_hours":null,"description":"Sample test PC.","location":"australia-southeast1","management_cluster":[{"cluster_id":"sample-mgmt-cluster","node_type_configs":[{"custom_core_count":0,"node_count":3,"node_type_id":"standard-72"}],"stretched_cluster_config":[]}],"name":"sample-private-cloud-c","network_config":[{"management_cidr":"192.168.30.0/24"}],"project":"fake-project","send_deletion_delay_hours_if_zero":null,"timeouts":null,"type":null},"sensitive_values":{"hcx":[],"management_cluster":[{"node_type_configs":[{}],"stretched_cluster_config":[]}],"network_config":[{}],"nsx":[],"vcenter":[]}},{"address":"google_vmwareengine_private_cloud.nc","mode":"managed","type":"google_vmwareengine_private_cloud","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"deletion_delay_hours":null,"description":"Sample test PC.","location":"us-west1-a","management_cluster":[{"cluster_id":"sample-mgmt-cluster","node_type_configs":[{"custom_core_count":0,"node_count":3,"node_type_id":"standard-72"}],"stretched_cluster_config":[]}],"name":"sample-private-cloud-nc","network_config":[{"management_cidr":"192.168.30.0/24"}],"project":"fake-project","send_deletion_delay_hours_if_zero":null,"timeouts":null,"type":null},"sensitive_values":{"hcx":[],"management_cluster":[{"node_type_configs":[{}],"stretched_cluster_config":[]}],"network_config":[{}],"nsx":[],"vcenter":[]}}]}},"resource_changes":[{"address":"google_vmwareengine_network.pc-nw","mode":"managed","type":"google_vmwareengine_network","name":"pc-nw","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"description":"PC network description.","location":"global","name":"pc-nw","project":"fake-project","timeouts":null,"type":"STANDARD"},"after_unknown":{"id":true,"state":true,"uid":true,"vpc_networks":true},"before_sensitive":false,"after_sensitive":{"vpc_networks":[]}}},{"address":"google_vmwareengine_network.pc-nw_nc","mode":"managed","type":"google_vmwareengine_network","name":"pc-nw_nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"description":"PC network description.","location":"global","name":"pc-nw","project":"fake-project","timeouts":null,"type":"STANDARD"},"after_unknown":{"id":true,"state":true,"uid":true,"vpc_networks":true},"before_sensitive":false,"after_sensitive":{"vpc_networks":[]}}},{"address":"google_vmwareengine_private_cloud.c","mode":"managed","type":"google_vmwareengine_private_cloud","name":"c","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"deletion_delay_hours":null,"description":"Sample test PC.","location":"australia-southeast1","management_cluster":[{"cluster_id":"sample-mgmt-cluster","node_type_configs":[{"custom_core_count":0,"node_count":3,"node_type_id":"standard-72"}],"stretched_cluster_config":[]}],"name":"sample-private-cloud-c","network_config":[{"management_cidr":"192.168.30.0/24"}],"project":"fake-project","send_deletion_delay_hours_if_zero":null,"timeouts":null,"type":null},"after_unknown":{"hcx":true,"id":true,"management_cluster":[{"node_type_configs":[{}],"stretched_cluster_config":[]}],"network_config":[{"dns_server_ip":true,"management_ip_address_layout_version":true,"vmware_engine_network":true,"vmware_engine_network_canonical":true}],"nsx":true,"state":true,"uid":true,"vcenter":true},"before_sensitive":false,"after_sensitive":{"hcx":[],"management_cluster":[{"node_type_configs":[{}],"stretched_cluster_config":[]}],"network_config":[{}],"nsx":[],"vcenter":[]}}},{"address":"google_vmwareengine_private_cloud.nc","mode":"managed","type":"google_vmwareengine_private_cloud","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"deletion_delay_hours":null,"description":"Sample test PC.","location":"us-west1-a","management_cluster":[{"cluster_id":"sample-mgmt-cluster","node_type_configs":[{"custom_core_count":0,"node_count":3,"node_type_id":"standard-72"}],"stretched_cluster_config":[]}],"name":"sample-private-cloud-nc","network_config":[{"management_cidr":"192.168.30.0/24"}],"project":"fake-project","send_deletion_delay_hours_if_zero":null,"timeouts":null,"type":null},"after_unknown":{"hcx":true,"id":true,"management_cluster":[{"node_type_configs":[{}],"stretched_cluster_config":[]}],"network_config":[{"dns_server_ip":true,"management_ip_address_layout_version":true,"vmware_engine_network":true,"vmware_engine_network_canonical":true}],"nsx":true,"state":true,"uid":true,"vcenter":true},"before_sensitive":false,"after_sensitive":{"hcx":[],"management_cluster":[{"node_type_configs":[{}],"stretched_cluster_config":[]}],"network_config":[{}],"nsx":[],"vcenter":[]}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_vmwareengine_network.pc-nw","mode":"managed","type":"google_vmwareengine_network","name":"pc-nw","provider_config_key":"google","expressions":{"description":{"constant_value":"PC network description."},"location":{"constant_value":"global"},"name":{"constant_value":"pc-nw"},"type":{"constant_value":"STANDARD"}},"schema_version":0},{"address":"google_vmwareengine_network.pc-nw_nc","mode":"managed","type":"google_vmwareengine_network","name":"pc-nw_nc","provider_config_key":"google","expressions":{"description":{"constant_value":"PC network description."},"location":{"constant_value":"global"},"name":{"constant_value":"pc-nw"},"type":{"constant_value":"STANDARD"}},"schema_version":0},{"address":"google_vmwareengine_private_cloud.c","mode":"managed","type":"google_vmwareengine_private_cloud","name":"c","provider_config_key":"google","expressions":{"description":{"constant_value":"Sample test PC."},"location":{"constant_value":"australia-southeast1"},"management_cluster":[{"cluster_id":{"constant_value":"sample-mgmt-cluster"},"node_type_configs":[{"node_count":{"constant_value":3},"node_type_id":{"constant_value":"standard-72"}}]}],"name":{"constant_value":"sample-private-cloud-c"},"network_config":[{"management_cidr":{"constant_value":"192.168.30.0/24"},"vmware_engine_network":{"references":["google_vmwareengine_network.pc-nw.id","google_vmwareengine_network.pc-nw"]}}]},"schema_version":0},{"address":"google_vmwareengine_private_cloud.nc","mode":"managed","type":"google_vmwareengine_private_cloud","name":"nc","provider_config_key":"google","expressions":{"description":{"constant_value":"Sample test PC."},"location":{"constant_value":"us-west1-a"},"management_cluster":[{"cluster_id":{"constant_value":"sample-mgmt-cluster"},"node_type_configs":[{"node_count":{"constant_value":3},"node_type_id":{"constant_value":"standard-72"}}]}],"name":{"constant_value":"sample-private-cloud-nc"},"network_config":[{"management_cidr":{"constant_value":"192.168.30.0/24"},"vmware_engine_network":{"references":["google_vmwareengine_network.pc-nw_nc.id","google_vmwareengine_network.pc-nw_nc"]}}]},"schema_version":0}]}},"relevant_attributes":[{"resource":"google_vmwareengine_network.pc-nw_nc","attribute":["id"]},{"resource":"google_vmwareengine_network.pc-nw","attribute":["id"]}],"timestamp":"2025-09-08T10:06:24Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/cloud_vmware_engine/private_cloud/zonal_location/plan b/inputs/gcp/cloud_vmware_engine/private_cloud/zonal_location/plan deleted file mode 100644 index c8fc9d861..000000000 Binary files a/inputs/gcp/cloud_vmware_engine/private_cloud/zonal_location/plan and /dev/null differ diff --git a/inputs/gcp/cloud_vmware_engine/private_cloud/zonal_location/plan.json b/inputs/gcp/cloud_vmware_engine/private_cloud/zonal_location/plan.json deleted file mode 100644 index e0090a137..000000000 --- a/inputs/gcp/cloud_vmware_engine/private_cloud/zonal_location/plan.json +++ /dev/null @@ -1 +0,0 @@ -{"format_version":"1.2","terraform_version":"1.9.5","planned_values":{"root_module":{"resources":[{"address":"google_vmwareengine_network.pc-nw","mode":"managed","type":"google_vmwareengine_network","name":"pc-nw","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"description":"PC network description.","location":"global","name":"pc-nw","project":"fake-project","timeouts":null,"type":"STANDARD"},"sensitive_values":{"vpc_networks":[]}},{"address":"google_vmwareengine_network.pc-nw_nc","mode":"managed","type":"google_vmwareengine_network","name":"pc-nw_nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"description":"PC network description.","location":"global","name":"pc-nw","project":"fake-project","timeouts":null,"type":"STANDARD"},"sensitive_values":{"vpc_networks":[]}},{"address":"google_vmwareengine_private_cloud.c","mode":"managed","type":"google_vmwareengine_private_cloud","name":"c","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"deletion_delay_hours":null,"description":"Sample test PC.","location":"australia-southeast-1","management_cluster":[{"autoscaling_settings":[],"cluster_id":"sample-mgmt-cluster","node_type_configs":[],"stretched_cluster_config":[{"preferred_location":"projects/projectabc/locations/australia-southeast1-a","secondary_location":"projects/projectabc/locations/australia-southeast2-b"}]}],"name":"sample-private-cloud-c","network_config":[{"management_cidr":"192.168.30.0/24"}],"project":"fake-project","send_deletion_delay_hours_if_zero":null,"timeouts":null,"type":"STRETCHED"},"sensitive_values":{"hcx":[],"management_cluster":[{"autoscaling_settings":[],"node_type_configs":[],"stretched_cluster_config":[{}]}],"network_config":[{}],"nsx":[],"vcenter":[]}},{"address":"google_vmwareengine_private_cloud.nc","mode":"managed","type":"google_vmwareengine_private_cloud","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"deletion_delay_hours":null,"description":"Sample test PC.","location":"australia-southeast-1","management_cluster":[{"autoscaling_settings":[],"cluster_id":"sample-mgmt-cluster","node_type_configs":[],"stretched_cluster_config":[{"preferred_location":"projects/projectabc/locations/asia-southeast2-c","secondary_location":"projects/projectabc/locations/asia-southeast1-b"}]}],"name":"sample-private-cloud-nc","network_config":[{"management_cidr":"192.168.30.0/24"}],"project":"fake-project","send_deletion_delay_hours_if_zero":null,"timeouts":null,"type":"STRETCHED"},"sensitive_values":{"hcx":[],"management_cluster":[{"autoscaling_settings":[],"node_type_configs":[],"stretched_cluster_config":[{}]}],"network_config":[{}],"nsx":[],"vcenter":[]}}]}},"resource_changes":[{"address":"google_vmwareengine_network.pc-nw","mode":"managed","type":"google_vmwareengine_network","name":"pc-nw","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"description":"PC network description.","location":"global","name":"pc-nw","project":"fake-project","timeouts":null,"type":"STANDARD"},"after_unknown":{"id":true,"state":true,"uid":true,"vpc_networks":true},"before_sensitive":false,"after_sensitive":{"vpc_networks":[]}}},{"address":"google_vmwareengine_network.pc-nw_nc","mode":"managed","type":"google_vmwareengine_network","name":"pc-nw_nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"description":"PC network description.","location":"global","name":"pc-nw","project":"fake-project","timeouts":null,"type":"STANDARD"},"after_unknown":{"id":true,"state":true,"uid":true,"vpc_networks":true},"before_sensitive":false,"after_sensitive":{"vpc_networks":[]}}},{"address":"google_vmwareengine_private_cloud.c","mode":"managed","type":"google_vmwareengine_private_cloud","name":"c","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"deletion_delay_hours":null,"description":"Sample test PC.","location":"australia-southeast-1","management_cluster":[{"autoscaling_settings":[],"cluster_id":"sample-mgmt-cluster","node_type_configs":[],"stretched_cluster_config":[{"preferred_location":"projects/projectabc/locations/australia-southeast1-a","secondary_location":"projects/projectabc/locations/australia-southeast2-b"}]}],"name":"sample-private-cloud-c","network_config":[{"management_cidr":"192.168.30.0/24"}],"project":"fake-project","send_deletion_delay_hours_if_zero":null,"timeouts":null,"type":"STRETCHED"},"after_unknown":{"hcx":true,"id":true,"management_cluster":[{"autoscaling_settings":[],"node_type_configs":[],"stretched_cluster_config":[{}]}],"network_config":[{"dns_server_ip":true,"management_ip_address_layout_version":true,"vmware_engine_network":true,"vmware_engine_network_canonical":true}],"nsx":true,"state":true,"uid":true,"vcenter":true},"before_sensitive":false,"after_sensitive":{"hcx":[],"management_cluster":[{"autoscaling_settings":[],"node_type_configs":[],"stretched_cluster_config":[{}]}],"network_config":[{}],"nsx":[],"vcenter":[]}}},{"address":"google_vmwareengine_private_cloud.nc","mode":"managed","type":"google_vmwareengine_private_cloud","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"deletion_delay_hours":null,"description":"Sample test PC.","location":"australia-southeast-1","management_cluster":[{"autoscaling_settings":[],"cluster_id":"sample-mgmt-cluster","node_type_configs":[],"stretched_cluster_config":[{"preferred_location":"projects/projectabc/locations/asia-southeast2-c","secondary_location":"projects/projectabc/locations/asia-southeast1-b"}]}],"name":"sample-private-cloud-nc","network_config":[{"management_cidr":"192.168.30.0/24"}],"project":"fake-project","send_deletion_delay_hours_if_zero":null,"timeouts":null,"type":"STRETCHED"},"after_unknown":{"hcx":true,"id":true,"management_cluster":[{"autoscaling_settings":[],"node_type_configs":[],"stretched_cluster_config":[{}]}],"network_config":[{"dns_server_ip":true,"management_ip_address_layout_version":true,"vmware_engine_network":true,"vmware_engine_network_canonical":true}],"nsx":true,"state":true,"uid":true,"vcenter":true},"before_sensitive":false,"after_sensitive":{"hcx":[],"management_cluster":[{"autoscaling_settings":[],"node_type_configs":[],"stretched_cluster_config":[{}]}],"network_config":[{}],"nsx":[],"vcenter":[]}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_vmwareengine_network.pc-nw","mode":"managed","type":"google_vmwareengine_network","name":"pc-nw","provider_config_key":"google","expressions":{"description":{"constant_value":"PC network description."},"location":{"constant_value":"global"},"name":{"constant_value":"pc-nw"},"type":{"constant_value":"STANDARD"}},"schema_version":0},{"address":"google_vmwareengine_network.pc-nw_nc","mode":"managed","type":"google_vmwareengine_network","name":"pc-nw_nc","provider_config_key":"google","expressions":{"description":{"constant_value":"PC network description."},"location":{"constant_value":"global"},"name":{"constant_value":"pc-nw"},"type":{"constant_value":"STANDARD"}},"schema_version":0},{"address":"google_vmwareengine_private_cloud.c","mode":"managed","type":"google_vmwareengine_private_cloud","name":"c","provider_config_key":"google","expressions":{"description":{"constant_value":"Sample test PC."},"location":{"constant_value":"australia-southeast-1"},"management_cluster":[{"cluster_id":{"constant_value":"sample-mgmt-cluster"},"stretched_cluster_config":[{"preferred_location":{"constant_value":"projects/projectabc/locations/australia-southeast1-a"},"secondary_location":{"constant_value":"projects/projectabc/locations/australia-southeast2-b"}}]}],"name":{"constant_value":"sample-private-cloud-c"},"network_config":[{"management_cidr":{"constant_value":"192.168.30.0/24"},"vmware_engine_network":{"references":["google_vmwareengine_network.pc-nw.id","google_vmwareengine_network.pc-nw"]}}],"type":{"constant_value":"STRETCHED"}},"schema_version":0},{"address":"google_vmwareengine_private_cloud.nc","mode":"managed","type":"google_vmwareengine_private_cloud","name":"nc","provider_config_key":"google","expressions":{"description":{"constant_value":"Sample test PC."},"location":{"constant_value":"australia-southeast-1"},"management_cluster":[{"cluster_id":{"constant_value":"sample-mgmt-cluster"},"stretched_cluster_config":[{"preferred_location":{"constant_value":"projects/projectabc/locations/asia-southeast2-c"},"secondary_location":{"constant_value":"projects/projectabc/locations/asia-southeast1-b"}}]}],"name":{"constant_value":"sample-private-cloud-nc"},"network_config":[{"management_cidr":{"constant_value":"192.168.30.0/24"},"vmware_engine_network":{"references":["google_vmwareengine_network.pc-nw_nc.id","google_vmwareengine_network.pc-nw_nc"]}}],"type":{"constant_value":"STRETCHED"}},"schema_version":0}]}},"relevant_attributes":[{"resource":"google_vmwareengine_network.pc-nw_nc","attribute":["id"]},{"resource":"google_vmwareengine_network.pc-nw","attribute":["id"]}],"timestamp":"2025-09-08T10:06:26Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/connection/.terraform.lock.hcl b/inputs/gcp/connection/.terraform.lock.hcl index 2333ee9ed..2688a2c4d 100644 --- a/inputs/gcp/connection/.terraform.lock.hcl +++ b/inputs/gcp/connection/.terraform.lock.hcl @@ -5,6 +5,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "7.2.0" hashes = [ "h1:18VXFhnaRathSq3gNdyy7NNSqNxcm/m6lHnXgFp/AHY=", + "h1:n9j0rZHrmXEay4dYo0D+RGS7X8eQr+YZ0MupX8GaMfI=", "zh:0f036e400c90ae45289b948afb49ca938d169fb4a31d7560b345fd0ae5121407", "zh:28a7c683656178456dc7942f051df46052150cee74da7535e7ca8748a83baf30", "zh:2994083c634cff44de626b4bfca3e5e8ed5b2a08baa6f4c4fa4b217d5f49559a", diff --git a/inputs/gcp/connection/plan b/inputs/gcp/connection/plan deleted file mode 100644 index 45ccd31a1..000000000 Binary files a/inputs/gcp/connection/plan and /dev/null differ diff --git a/inputs/gcp/connection/plan.json b/inputs/gcp/connection/plan.json deleted file mode 100644 index ca5705809..000000000 Binary files a/inputs/gcp/connection/plan.json and /dev/null differ diff --git a/inputs/gcp/database_migration_service/connection_profile/cloudsql_authorized_networks/.terraform.lock.hcl b/inputs/gcp/database_migration_service/connection_profile/cloudsql_authorized_networks/.terraform.lock.hcl index 2333ee9ed..2688a2c4d 100644 --- a/inputs/gcp/database_migration_service/connection_profile/cloudsql_authorized_networks/.terraform.lock.hcl +++ b/inputs/gcp/database_migration_service/connection_profile/cloudsql_authorized_networks/.terraform.lock.hcl @@ -5,6 +5,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "7.2.0" hashes = [ "h1:18VXFhnaRathSq3gNdyy7NNSqNxcm/m6lHnXgFp/AHY=", + "h1:n9j0rZHrmXEay4dYo0D+RGS7X8eQr+YZ0MupX8GaMfI=", "zh:0f036e400c90ae45289b948afb49ca938d169fb4a31d7560b345fd0ae5121407", "zh:28a7c683656178456dc7942f051df46052150cee74da7535e7ca8748a83baf30", "zh:2994083c634cff44de626b4bfca3e5e8ed5b2a08baa6f4c4fa4b217d5f49559a", diff --git a/inputs/gcp/database_migration_service/connection_profile/cloudsql_cmek/.terraform.lock.hcl b/inputs/gcp/database_migration_service/connection_profile/cloudsql_cmek/.terraform.lock.hcl index 2333ee9ed..2688a2c4d 100644 --- a/inputs/gcp/database_migration_service/connection_profile/cloudsql_cmek/.terraform.lock.hcl +++ b/inputs/gcp/database_migration_service/connection_profile/cloudsql_cmek/.terraform.lock.hcl @@ -5,6 +5,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "7.2.0" hashes = [ "h1:18VXFhnaRathSq3gNdyy7NNSqNxcm/m6lHnXgFp/AHY=", + "h1:n9j0rZHrmXEay4dYo0D+RGS7X8eQr+YZ0MupX8GaMfI=", "zh:0f036e400c90ae45289b948afb49ca938d169fb4a31d7560b345fd0ae5121407", "zh:28a7c683656178456dc7942f051df46052150cee74da7535e7ca8748a83baf30", "zh:2994083c634cff44de626b4bfca3e5e8ed5b2a08baa6f4c4fa4b217d5f49559a", diff --git a/inputs/gcp/database_migration_service/connection_profile/cloudsql_private_network/.terraform.lock.hcl b/inputs/gcp/database_migration_service/connection_profile/cloudsql_private_network/.terraform.lock.hcl index 2333ee9ed..2688a2c4d 100644 --- a/inputs/gcp/database_migration_service/connection_profile/cloudsql_private_network/.terraform.lock.hcl +++ b/inputs/gcp/database_migration_service/connection_profile/cloudsql_private_network/.terraform.lock.hcl @@ -5,6 +5,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "7.2.0" hashes = [ "h1:18VXFhnaRathSq3gNdyy7NNSqNxcm/m6lHnXgFp/AHY=", + "h1:n9j0rZHrmXEay4dYo0D+RGS7X8eQr+YZ0MupX8GaMfI=", "zh:0f036e400c90ae45289b948afb49ca938d169fb4a31d7560b345fd0ae5121407", "zh:28a7c683656178456dc7942f051df46052150cee74da7535e7ca8748a83baf30", "zh:2994083c634cff44de626b4bfca3e5e8ed5b2a08baa6f4c4fa4b217d5f49559a", diff --git a/inputs/gcp/database_migration_service/connection_profile/cloudsql_require_ssl/.terraform.lock.hcl b/inputs/gcp/database_migration_service/connection_profile/cloudsql_require_ssl/.terraform.lock.hcl index 2333ee9ed..2688a2c4d 100644 --- a/inputs/gcp/database_migration_service/connection_profile/cloudsql_require_ssl/.terraform.lock.hcl +++ b/inputs/gcp/database_migration_service/connection_profile/cloudsql_require_ssl/.terraform.lock.hcl @@ -5,6 +5,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "7.2.0" hashes = [ "h1:18VXFhnaRathSq3gNdyy7NNSqNxcm/m6lHnXgFp/AHY=", + "h1:n9j0rZHrmXEay4dYo0D+RGS7X8eQr+YZ0MupX8GaMfI=", "zh:0f036e400c90ae45289b948afb49ca938d169fb4a31d7560b345fd0ae5121407", "zh:28a7c683656178456dc7942f051df46052150cee74da7535e7ca8748a83baf30", "zh:2994083c634cff44de626b4bfca3e5e8ed5b2a08baa6f4c4fa4b217d5f49559a", diff --git a/inputs/gcp/database_migration_service/connection_profile/forward_ssh_connectivity/.terraform.lock.hcl b/inputs/gcp/database_migration_service/connection_profile/forward_ssh_connectivity/.terraform.lock.hcl index 2333ee9ed..2688a2c4d 100644 --- a/inputs/gcp/database_migration_service/connection_profile/forward_ssh_connectivity/.terraform.lock.hcl +++ b/inputs/gcp/database_migration_service/connection_profile/forward_ssh_connectivity/.terraform.lock.hcl @@ -5,6 +5,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "7.2.0" hashes = [ "h1:18VXFhnaRathSq3gNdyy7NNSqNxcm/m6lHnXgFp/AHY=", + "h1:n9j0rZHrmXEay4dYo0D+RGS7X8eQr+YZ0MupX8GaMfI=", "zh:0f036e400c90ae45289b948afb49ca938d169fb4a31d7560b345fd0ae5121407", "zh:28a7c683656178456dc7942f051df46052150cee74da7535e7ca8748a83baf30", "zh:2994083c634cff44de626b4bfca3e5e8ed5b2a08baa6f4c4fa4b217d5f49559a", diff --git a/inputs/gcp/database_migration_service/connection_profile/location/.terraform.lock.hcl b/inputs/gcp/database_migration_service/connection_profile/location/.terraform.lock.hcl index 2333ee9ed..2688a2c4d 100644 --- a/inputs/gcp/database_migration_service/connection_profile/location/.terraform.lock.hcl +++ b/inputs/gcp/database_migration_service/connection_profile/location/.terraform.lock.hcl @@ -5,6 +5,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "7.2.0" hashes = [ "h1:18VXFhnaRathSq3gNdyy7NNSqNxcm/m6lHnXgFp/AHY=", + "h1:n9j0rZHrmXEay4dYo0D+RGS7X8eQr+YZ0MupX8GaMfI=", "zh:0f036e400c90ae45289b948afb49ca938d169fb4a31d7560b345fd0ae5121407", "zh:28a7c683656178456dc7942f051df46052150cee74da7535e7ca8748a83baf30", "zh:2994083c634cff44de626b4bfca3e5e8ed5b2a08baa6f4c4fa4b217d5f49559a", diff --git a/inputs/gcp/database_migration_service/connection_profile/mysql_ssl_type/.terraform.lock.hcl b/inputs/gcp/database_migration_service/connection_profile/mysql_ssl_type/.terraform.lock.hcl index 2333ee9ed..2688a2c4d 100644 --- a/inputs/gcp/database_migration_service/connection_profile/mysql_ssl_type/.terraform.lock.hcl +++ b/inputs/gcp/database_migration_service/connection_profile/mysql_ssl_type/.terraform.lock.hcl @@ -5,6 +5,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "7.2.0" hashes = [ "h1:18VXFhnaRathSq3gNdyy7NNSqNxcm/m6lHnXgFp/AHY=", + "h1:n9j0rZHrmXEay4dYo0D+RGS7X8eQr+YZ0MupX8GaMfI=", "zh:0f036e400c90ae45289b948afb49ca938d169fb4a31d7560b345fd0ae5121407", "zh:28a7c683656178456dc7942f051df46052150cee74da7535e7ca8748a83baf30", "zh:2994083c634cff44de626b4bfca3e5e8ed5b2a08baa6f4c4fa4b217d5f49559a", diff --git a/inputs/gcp/database_migration_service/connection_profile/postgresql_ssl_type/.terraform.lock.hcl b/inputs/gcp/database_migration_service/connection_profile/postgresql_ssl_type/.terraform.lock.hcl index 2333ee9ed..2688a2c4d 100644 --- a/inputs/gcp/database_migration_service/connection_profile/postgresql_ssl_type/.terraform.lock.hcl +++ b/inputs/gcp/database_migration_service/connection_profile/postgresql_ssl_type/.terraform.lock.hcl @@ -5,6 +5,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "7.2.0" hashes = [ "h1:18VXFhnaRathSq3gNdyy7NNSqNxcm/m6lHnXgFp/AHY=", + "h1:n9j0rZHrmXEay4dYo0D+RGS7X8eQr+YZ0MupX8GaMfI=", "zh:0f036e400c90ae45289b948afb49ca938d169fb4a31d7560b345fd0ae5121407", "zh:28a7c683656178456dc7942f051df46052150cee74da7535e7ca8748a83baf30", "zh:2994083c634cff44de626b4bfca3e5e8ed5b2a08baa6f4c4fa4b217d5f49559a", diff --git a/inputs/gcp/database_migration_service/connection_profile/private_connectivity/.terraform.lock.hcl b/inputs/gcp/database_migration_service/connection_profile/private_connectivity/.terraform.lock.hcl index 2333ee9ed..2688a2c4d 100644 --- a/inputs/gcp/database_migration_service/connection_profile/private_connectivity/.terraform.lock.hcl +++ b/inputs/gcp/database_migration_service/connection_profile/private_connectivity/.terraform.lock.hcl @@ -5,6 +5,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "7.2.0" hashes = [ "h1:18VXFhnaRathSq3gNdyy7NNSqNxcm/m6lHnXgFp/AHY=", + "h1:n9j0rZHrmXEay4dYo0D+RGS7X8eQr+YZ0MupX8GaMfI=", "zh:0f036e400c90ae45289b948afb49ca938d169fb4a31d7560b345fd0ae5121407", "zh:28a7c683656178456dc7942f051df46052150cee74da7535e7ca8748a83baf30", "zh:2994083c634cff44de626b4bfca3e5e8ed5b2a08baa6f4c4fa4b217d5f49559a", diff --git a/inputs/gcp/database_migration_service/connection_profile/static_service_ip_connectivity/.terraform.lock.hcl b/inputs/gcp/database_migration_service/connection_profile/static_service_ip_connectivity/.terraform.lock.hcl index 2333ee9ed..2688a2c4d 100644 --- a/inputs/gcp/database_migration_service/connection_profile/static_service_ip_connectivity/.terraform.lock.hcl +++ b/inputs/gcp/database_migration_service/connection_profile/static_service_ip_connectivity/.terraform.lock.hcl @@ -5,6 +5,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "7.2.0" hashes = [ "h1:18VXFhnaRathSq3gNdyy7NNSqNxcm/m6lHnXgFp/AHY=", + "h1:n9j0rZHrmXEay4dYo0D+RGS7X8eQr+YZ0MupX8GaMfI=", "zh:0f036e400c90ae45289b948afb49ca938d169fb4a31d7560b345fd0ae5121407", "zh:28a7c683656178456dc7942f051df46052150cee74da7535e7ca8748a83baf30", "zh:2994083c634cff44de626b4bfca3e5e8ed5b2a08baa6f4c4fa4b217d5f49559a", diff --git a/inputs/gcp/database_migration_service/migration_job/dump_type/.terraform.lock.hcl b/inputs/gcp/database_migration_service/migration_job/dump_type/.terraform.lock.hcl index fe6a5e1b0..d06932c6a 100644 --- a/inputs/gcp/database_migration_service/migration_job/dump_type/.terraform.lock.hcl +++ b/inputs/gcp/database_migration_service/migration_job/dump_type/.terraform.lock.hcl @@ -5,6 +5,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "6.48.0" hashes = [ "h1:oJDt+gkWRkrYUBpXhrCtdTmpj7+wI+iGhT4v8LSnIlA=", + "h1:rfboi/oqg/pRsCmraLdZdNX2uGzuaOgaXkSWcS1nhTQ=", "zh:3640317ada2141ab5b54b5c5c2b1d0f60af861fb9788f05808b5d5d7ac8d1819", "zh:4ec6082c343d7ea097bf725c7f550978789860f43b442a7709e1a4ca209d10a7", "zh:66dcb85612f82c464a682e03a20e9dfd479e743d63a7e9cf754dcf81fa6e442b", diff --git a/inputs/gcp/database_migration_service/migration_job/location/.terraform.lock.hcl b/inputs/gcp/database_migration_service/migration_job/location/.terraform.lock.hcl index fe6a5e1b0..d06932c6a 100644 --- a/inputs/gcp/database_migration_service/migration_job/location/.terraform.lock.hcl +++ b/inputs/gcp/database_migration_service/migration_job/location/.terraform.lock.hcl @@ -5,6 +5,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "6.48.0" hashes = [ "h1:oJDt+gkWRkrYUBpXhrCtdTmpj7+wI+iGhT4v8LSnIlA=", + "h1:rfboi/oqg/pRsCmraLdZdNX2uGzuaOgaXkSWcS1nhTQ=", "zh:3640317ada2141ab5b54b5c5c2b1d0f60af861fb9788f05808b5d5d7ac8d1819", "zh:4ec6082c343d7ea097bf725c7f550978789860f43b442a7709e1a4ca209d10a7", "zh:66dcb85612f82c464a682e03a20e9dfd479e743d63a7e9cf754dcf81fa6e442b", diff --git a/inputs/gcp/database_migration_service/migration_job/reverse_ssh_connectivity/.terraform.lock.hcl b/inputs/gcp/database_migration_service/migration_job/reverse_ssh_connectivity/.terraform.lock.hcl index 2333ee9ed..2688a2c4d 100644 --- a/inputs/gcp/database_migration_service/migration_job/reverse_ssh_connectivity/.terraform.lock.hcl +++ b/inputs/gcp/database_migration_service/migration_job/reverse_ssh_connectivity/.terraform.lock.hcl @@ -5,6 +5,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "7.2.0" hashes = [ "h1:18VXFhnaRathSq3gNdyy7NNSqNxcm/m6lHnXgFp/AHY=", + "h1:n9j0rZHrmXEay4dYo0D+RGS7X8eQr+YZ0MupX8GaMfI=", "zh:0f036e400c90ae45289b948afb49ca938d169fb4a31d7560b345fd0ae5121407", "zh:28a7c683656178456dc7942f051df46052150cee74da7535e7ca8748a83baf30", "zh:2994083c634cff44de626b4bfca3e5e8ed5b2a08baa6f4c4fa4b217d5f49559a", diff --git a/inputs/gcp/database_migration_service/migration_job/static_ip_connectivity/.terraform.lock.hcl b/inputs/gcp/database_migration_service/migration_job/static_ip_connectivity/.terraform.lock.hcl index 2333ee9ed..2688a2c4d 100644 --- a/inputs/gcp/database_migration_service/migration_job/static_ip_connectivity/.terraform.lock.hcl +++ b/inputs/gcp/database_migration_service/migration_job/static_ip_connectivity/.terraform.lock.hcl @@ -5,6 +5,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "7.2.0" hashes = [ "h1:18VXFhnaRathSq3gNdyy7NNSqNxcm/m6lHnXgFp/AHY=", + "h1:n9j0rZHrmXEay4dYo0D+RGS7X8eQr+YZ0MupX8GaMfI=", "zh:0f036e400c90ae45289b948afb49ca938d169fb4a31d7560b345fd0ae5121407", "zh:28a7c683656178456dc7942f051df46052150cee74da7535e7ca8748a83baf30", "zh:2994083c634cff44de626b4bfca3e5e8ed5b2a08baa6f4c4fa4b217d5f49559a", diff --git a/inputs/gcp/database_migration_service/migration_job/type/.terraform.lock.hcl b/inputs/gcp/database_migration_service/migration_job/type/.terraform.lock.hcl index 2333ee9ed..2688a2c4d 100644 --- a/inputs/gcp/database_migration_service/migration_job/type/.terraform.lock.hcl +++ b/inputs/gcp/database_migration_service/migration_job/type/.terraform.lock.hcl @@ -5,6 +5,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "7.2.0" hashes = [ "h1:18VXFhnaRathSq3gNdyy7NNSqNxcm/m6lHnXgFp/AHY=", + "h1:n9j0rZHrmXEay4dYo0D+RGS7X8eQr+YZ0MupX8GaMfI=", "zh:0f036e400c90ae45289b948afb49ca938d169fb4a31d7560b345fd0ae5121407", "zh:28a7c683656178456dc7942f051df46052150cee74da7535e7ca8748a83baf30", "zh:2994083c634cff44de626b4bfca3e5e8ed5b2a08baa6f4c4fa4b217d5f49559a", diff --git a/inputs/gcp/database_migration_service/migration_job/vpc_peering_connectivity/.terraform.lock.hcl b/inputs/gcp/database_migration_service/migration_job/vpc_peering_connectivity/.terraform.lock.hcl index 2333ee9ed..2688a2c4d 100644 --- a/inputs/gcp/database_migration_service/migration_job/vpc_peering_connectivity/.terraform.lock.hcl +++ b/inputs/gcp/database_migration_service/migration_job/vpc_peering_connectivity/.terraform.lock.hcl @@ -5,6 +5,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "7.2.0" hashes = [ "h1:18VXFhnaRathSq3gNdyy7NNSqNxcm/m6lHnXgFp/AHY=", + "h1:n9j0rZHrmXEay4dYo0D+RGS7X8eQr+YZ0MupX8GaMfI=", "zh:0f036e400c90ae45289b948afb49ca938d169fb4a31d7560b345fd0ae5121407", "zh:28a7c683656178456dc7942f051df46052150cee74da7535e7ca8748a83baf30", "zh:2994083c634cff44de626b4bfca3e5e8ed5b2a08baa6f4c4fa4b217d5f49559a", diff --git a/inputs/gcp/database_migration_service/private_connection/create_without_validation/.terraform.lock.hcl b/inputs/gcp/database_migration_service/private_connection/create_without_validation/.terraform.lock.hcl index f894cd34c..aaa193309 100644 --- a/inputs/gcp/database_migration_service/private_connection/create_without_validation/.terraform.lock.hcl +++ b/inputs/gcp/database_migration_service/private_connection/create_without_validation/.terraform.lock.hcl @@ -5,6 +5,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "6.47.0" hashes = [ "h1:bExJu7/J59H98SCpM4bh/+pwOCNkufRslW8v8Kn3+nc=", + "h1:pPMN8oThEMq/x9mtNlSN3et2F0xbei7Pmg42JhIWPMU=", "zh:07df79b5ece8119bb752a47954845b392f0d492f40aefa482e21caa805315ccd", "zh:276e24e418c7063129d7b16b9d8299fde3e7976edf3992717d22aa327b184312", "zh:31fc8fc04d2749a3902c135ea286cc1783530cdc5dcf540790fd56bff9140286", diff --git a/inputs/gcp/database_migration_service/private_connection/location/.terraform.lock.hcl b/inputs/gcp/database_migration_service/private_connection/location/.terraform.lock.hcl index f894cd34c..aaa193309 100644 --- a/inputs/gcp/database_migration_service/private_connection/location/.terraform.lock.hcl +++ b/inputs/gcp/database_migration_service/private_connection/location/.terraform.lock.hcl @@ -5,6 +5,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "6.47.0" hashes = [ "h1:bExJu7/J59H98SCpM4bh/+pwOCNkufRslW8v8Kn3+nc=", + "h1:pPMN8oThEMq/x9mtNlSN3et2F0xbei7Pmg42JhIWPMU=", "zh:07df79b5ece8119bb752a47954845b392f0d492f40aefa482e21caa805315ccd", "zh:276e24e418c7063129d7b16b9d8299fde3e7976edf3992717d22aa327b184312", "zh:31fc8fc04d2749a3902c135ea286cc1783530cdc5dcf540790fd56bff9140286", diff --git a/inputs/gcp/dataform/google_dataform_repository/deletion_policy/c.tf b/inputs/gcp/dataform/google_dataform_repository/deletion_policy/c.tf index 5d0e1b47b..c81c1eb84 100644 --- a/inputs/gcp/dataform/google_dataform_repository/deletion_policy/c.tf +++ b/inputs/gcp/dataform/google_dataform_repository/deletion_policy/c.tf @@ -2,11 +2,8 @@ resource "google_dataform_repository" "c" { provider = google-beta - project = var.project region = "australia-southeast1" name = "c" display_name = "c" deletion_policy = "DELETE" } - -variable "project" { type = string } diff --git a/inputs/gcp/dataform/google_dataform_repository/deletion_policy/nc.tf b/inputs/gcp/dataform/google_dataform_repository/deletion_policy/nc.tf index 31dff7381..bda32ff8e 100644 --- a/inputs/gcp/dataform/google_dataform_repository/deletion_policy/nc.tf +++ b/inputs/gcp/dataform/google_dataform_repository/deletion_policy/nc.tf @@ -2,7 +2,6 @@ resource "google_dataform_repository" "nc" { provider = google-beta - project = var.project region = "australia-southeast1" name = "nc" display_name = "nc" diff --git a/inputs/gcp/dataform/google_dataform_repository/deletion_policy/plan.json b/inputs/gcp/dataform/google_dataform_repository/deletion_policy/plan.json deleted file mode 100644 index b55425a73..000000000 Binary files a/inputs/gcp/dataform/google_dataform_repository/deletion_policy/plan.json and /dev/null differ diff --git a/inputs/gcp/dataform/google_dataform_repository/encryption/.terraform.lock.hcl b/inputs/gcp/dataform/google_dataform_repository/encryption/.terraform.lock.hcl index 59a9f0c15..cec0628fa 100644 --- a/inputs/gcp/dataform/google_dataform_repository/encryption/.terraform.lock.hcl +++ b/inputs/gcp/dataform/google_dataform_repository/encryption/.terraform.lock.hcl @@ -1,25 +1,6 @@ # This file is maintained automatically by "terraform init". # Manual edits may be lost in future updates. -provider "registry.terraform.io/hashicorp/google" { - version = "7.3.0" - hashes = [ - "h1:1WxLeVFcyCHXxeujuSS2Alr72zMqDK4IaCQlGiROuD4=", - "zh:135c90b063f15c090ce82d99887032e495bbe6388764b666148ae78a776c4621", - "zh:47bb8721c29556b3b42f7c2ed73f8fdfb214609599ba819eebbe9ae33aab0e07", - "zh:532d385f6381eaee111d96296fcd9da7cdefb31b2afc81e36f390bd6ea1c5e99", - "zh:5c96018f5b722d2871ae2cf21dab9b05ec722270facd2e62393bcf89dc34852d", - "zh:703caf0829c30e3d166f61a7af208388840b384be1ec440b0955584856d22e30", - "zh:80b965cbe057eea5205c8bfd81fce642de7425dab86482f91bef136b3c1faaff", - "zh:a18b8178124d5dcd8a69bb6fc37206838f03699f2443e803142b1e2fde6f55d1", - "zh:bdddc969d92f5ecafbf762179e2291169a7e24214a52ff263aaf872b5cceb582", - "zh:e30f79beaf07618131a717734a58f7b5626c1c53d6cc14887c7098add73e0ccb", - "zh:e95fe5ec32e9eeff1d56379c84bee3fac0a7f12ea1b90f34ff7d88d469f56c23", - "zh:f569b65999264a9416862bca5cd2a6177d94ccb0424f3a4ef424428912b9cb3c", - "zh:fec21ae17d9d4e814d65ff377fbe1e2543636aaa3439a8a7a3447e7623044a4e", - ] -} - provider "registry.terraform.io/hashicorp/google-beta" { version = "7.3.0" hashes = [ diff --git a/inputs/gcp/dataform/google_dataform_repository/encryption/c.tf b/inputs/gcp/dataform/google_dataform_repository/encryption/c.tf index db3e7049d..f8966b40b 100644 --- a/inputs/gcp/dataform/google_dataform_repository/encryption/c.tf +++ b/inputs/gcp/dataform/google_dataform_repository/encryption/c.tf @@ -2,7 +2,6 @@ resource "google_dataform_repository" "c" { provider = google-beta - project = var.project region = "australia-southeast1" name = "c" display_name = "c" diff --git a/inputs/gcp/dataform/google_dataform_repository/encryption/nc.tf b/inputs/gcp/dataform/google_dataform_repository/encryption/nc.tf index 46dfd3956..d835807a1 100644 --- a/inputs/gcp/dataform/google_dataform_repository/encryption/nc.tf +++ b/inputs/gcp/dataform/google_dataform_repository/encryption/nc.tf @@ -2,7 +2,6 @@ resource "google_dataform_repository" "nc" { provider = google-beta - project = var.project region = "australia-southeast1" name = "nc" display_name = "nc" diff --git a/inputs/gcp/dataform/google_dataform_repository/encryption/plan.json b/inputs/gcp/dataform/google_dataform_repository/encryption/plan.json deleted file mode 100644 index b6e6894d6..000000000 Binary files a/inputs/gcp/dataform/google_dataform_repository/encryption/plan.json and /dev/null differ diff --git a/inputs/gcp/dataform/google_dataform_repository/encryption/variables.tf b/inputs/gcp/dataform/google_dataform_repository/encryption/variables.tf deleted file mode 100644 index e400d342b..000000000 --- a/inputs/gcp/dataform/google_dataform_repository/encryption/variables.tf +++ /dev/null @@ -1,3 +0,0 @@ -variable "project" { type = string } - - diff --git a/inputs/gcp/dataform/google_dataform_repository/git_https_secret/c.tf b/inputs/gcp/dataform/google_dataform_repository/git_https_secret/c.tf index 433711549..039ba3294 100644 --- a/inputs/gcp/dataform/google_dataform_repository/git_https_secret/c.tf +++ b/inputs/gcp/dataform/google_dataform_repository/git_https_secret/c.tf @@ -2,7 +2,6 @@ resource "google_dataform_repository" "c" { provider = google-beta - project = var.project region = "australia-southeast1" name = "c" display_name = "c" @@ -12,6 +11,4 @@ resource "google_dataform_repository" "c" { default_branch = "main" authentication_token_secret_version = "projects/example-project/secrets/git-token/versions/1" } -} - -variable "project" { type = string } +} \ No newline at end of file diff --git a/inputs/gcp/dataform/google_dataform_repository/git_https_secret/nc.tf b/inputs/gcp/dataform/google_dataform_repository/git_https_secret/nc.tf index ae799a6c7..db9776aad 100644 --- a/inputs/gcp/dataform/google_dataform_repository/git_https_secret/nc.tf +++ b/inputs/gcp/dataform/google_dataform_repository/git_https_secret/nc.tf @@ -2,7 +2,6 @@ resource "google_dataform_repository" "nc" { provider = google-beta - project = var.project region = "australia-southeast1" name = "nc" display_name = "nc" diff --git a/inputs/gcp/dataform/google_dataform_repository/git_https_secret/plan.json b/inputs/gcp/dataform/google_dataform_repository/git_https_secret/plan.json deleted file mode 100644 index 7230d1aee..000000000 Binary files a/inputs/gcp/dataform/google_dataform_repository/git_https_secret/plan.json and /dev/null differ diff --git a/inputs/gcp/dataform/google_dataform_repository/git_required/c.tf b/inputs/gcp/dataform/google_dataform_repository/git_required/c.tf index 8d586908e..dbf291681 100644 --- a/inputs/gcp/dataform/google_dataform_repository/git_required/c.tf +++ b/inputs/gcp/dataform/google_dataform_repository/git_required/c.tf @@ -2,16 +2,14 @@ resource "google_dataform_repository" "c" { provider = google-beta - project = var.project + project = "reliable-alpha-478205-k9" region = "australia-southeast1" name = "c" display_name = "c" - + git_remote_settings { - url = "https://github.com/example/repo.git" - default_branch = "main" + url = "https://github.com/example/repo.git" + default_branch = "main" authentication_token_secret_version = "projects/example-project/secrets/git-token/versions/1" } } - -variable "project" { type = string } diff --git a/inputs/gcp/dataform/google_dataform_repository/git_required/nc.tf b/inputs/gcp/dataform/google_dataform_repository/git_required/nc.tf index bfb1e334b..0a874cd4f 100644 --- a/inputs/gcp/dataform/google_dataform_repository/git_required/nc.tf +++ b/inputs/gcp/dataform/google_dataform_repository/git_required/nc.tf @@ -2,7 +2,7 @@ resource "google_dataform_repository" "nc" { provider = google-beta - project = var.project + project = "reliable-alpha-478205-k9" region = "australia-southeast1" name = "nc" display_name = "nc" diff --git a/inputs/gcp/dataform/google_dataform_repository/git_required/plan.json b/inputs/gcp/dataform/google_dataform_repository/git_required/plan.json deleted file mode 100644 index a5a7c1f2a..000000000 Binary files a/inputs/gcp/dataform/google_dataform_repository/git_required/plan.json and /dev/null differ diff --git a/inputs/gcp/dataform/google_dataform_repository/git_ssh_auth/c.tf b/inputs/gcp/dataform/google_dataform_repository/git_ssh_auth/c.tf index ab06630a1..3b663e146 100644 --- a/inputs/gcp/dataform/google_dataform_repository/git_ssh_auth/c.tf +++ b/inputs/gcp/dataform/google_dataform_repository/git_ssh_auth/c.tf @@ -2,7 +2,6 @@ resource "google_dataform_repository" "c" { provider = google-beta - project = var.project region = "australia-southeast1" name = "c" display_name = "c" diff --git a/inputs/gcp/dataform/google_dataform_repository/git_ssh_auth/nc.tf b/inputs/gcp/dataform/google_dataform_repository/git_ssh_auth/nc.tf index 72939d338..4f288cd6f 100644 --- a/inputs/gcp/dataform/google_dataform_repository/git_ssh_auth/nc.tf +++ b/inputs/gcp/dataform/google_dataform_repository/git_ssh_auth/nc.tf @@ -2,7 +2,6 @@ resource "google_dataform_repository" "nc" { provider = google-beta - project = var.project region = "australia-southeast1" name = "nc" display_name = "nc" diff --git a/inputs/gcp/dataform/google_dataform_repository/git_ssh_auth/plan.json b/inputs/gcp/dataform/google_dataform_repository/git_ssh_auth/plan.json deleted file mode 100644 index 2ff5e93c2..000000000 Binary files a/inputs/gcp/dataform/google_dataform_repository/git_ssh_auth/plan.json and /dev/null differ diff --git a/inputs/gcp/dataform/google_dataform_repository/git_ssh_auth/variables.tf b/inputs/gcp/dataform/google_dataform_repository/git_ssh_auth/variables.tf deleted file mode 100644 index e400d342b..000000000 --- a/inputs/gcp/dataform/google_dataform_repository/git_ssh_auth/variables.tf +++ /dev/null @@ -1,3 +0,0 @@ -variable "project" { type = string } - - diff --git a/inputs/gcp/dataform/google_dataform_repository/labels_security_required/c.tf b/inputs/gcp/dataform/google_dataform_repository/labels_security_required/c.tf index 4bc2ee347..4a9ddc34a 100644 --- a/inputs/gcp/dataform/google_dataform_repository/labels_security_required/c.tf +++ b/inputs/gcp/dataform/google_dataform_repository/labels_security_required/c.tf @@ -2,7 +2,6 @@ resource "google_dataform_repository" "c" { provider = google-beta - project = var.project region = "australia-southeast1" name = "c" display_name = "c" diff --git a/inputs/gcp/dataform/google_dataform_repository/labels_security_required/nc.tf b/inputs/gcp/dataform/google_dataform_repository/labels_security_required/nc.tf index 920dcf13f..8983beaf1 100644 --- a/inputs/gcp/dataform/google_dataform_repository/labels_security_required/nc.tf +++ b/inputs/gcp/dataform/google_dataform_repository/labels_security_required/nc.tf @@ -2,7 +2,6 @@ resource "google_dataform_repository" "nc" { provider = google-beta - project = var.project region = "australia-southeast1" name = "nc" display_name = "nc" diff --git a/inputs/gcp/dataform/google_dataform_repository/labels_security_required/plan.json b/inputs/gcp/dataform/google_dataform_repository/labels_security_required/plan.json deleted file mode 100644 index 264d9a985..000000000 Binary files a/inputs/gcp/dataform/google_dataform_repository/labels_security_required/plan.json and /dev/null differ diff --git a/inputs/gcp/dataform/google_dataform_repository/labels_security_required/variables.tf b/inputs/gcp/dataform/google_dataform_repository/labels_security_required/variables.tf deleted file mode 100644 index 47de7dcdb..000000000 --- a/inputs/gcp/dataform/google_dataform_repository/labels_security_required/variables.tf +++ /dev/null @@ -1,5 +0,0 @@ -variable "project" { - type = string -} - - diff --git a/inputs/gcp/dataform/google_dataform_repository/region_allowlist/c.tf b/inputs/gcp/dataform/google_dataform_repository/region_allowlist/c.tf index c023c59f5..cefa61d2f 100644 --- a/inputs/gcp/dataform/google_dataform_repository/region_allowlist/c.tf +++ b/inputs/gcp/dataform/google_dataform_repository/region_allowlist/c.tf @@ -2,7 +2,6 @@ resource "google_dataform_repository" "c" { provider = google-beta - project = var.project region = "australia-southeast1" name = "c" display_name = "c" diff --git a/inputs/gcp/dataform/google_dataform_repository/region_allowlist/nc.tf b/inputs/gcp/dataform/google_dataform_repository/region_allowlist/nc.tf index fe13aa65f..cd4fe5f62 100644 --- a/inputs/gcp/dataform/google_dataform_repository/region_allowlist/nc.tf +++ b/inputs/gcp/dataform/google_dataform_repository/region_allowlist/nc.tf @@ -2,7 +2,6 @@ resource "google_dataform_repository" "nc" { provider = google-beta - project = var.project region = "us-central1" # Non-approved region for testing policy enforcement name = "nc" display_name = "nc" diff --git a/inputs/gcp/dataform/google_dataform_repository/region_allowlist/plan.json b/inputs/gcp/dataform/google_dataform_repository/region_allowlist/plan.json deleted file mode 100644 index d79fe19c8..000000000 --- a/inputs/gcp/dataform/google_dataform_repository/region_allowlist/plan.json +++ /dev/null @@ -1 +0,0 @@ -{"format_version":"1.2","terraform_version":"1.12.2","variables":{"project":{"value":"test-project"}},"planned_values":{"root_module":{"resources":[{"address":"google_dataform_repository.c","mode":"managed","type":"google_dataform_repository","name":"c","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"deletion_policy":"DELETE","display_name":"c","effective_labels":{"goog-terraform-provisioned":"true"},"git_remote_settings":[],"kms_key_name":null,"labels":null,"name":"c","npmrc_environment_variables_secret_version":null,"project":"test-project","region":"australia-southeast1","service_account":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null,"workspace_compilation_overrides":[]},"sensitive_values":{"effective_labels":{},"git_remote_settings":[],"terraform_labels":{},"workspace_compilation_overrides":[]}},{"address":"google_dataform_repository.nc","mode":"managed","type":"google_dataform_repository","name":"nc","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"deletion_policy":"DELETE","display_name":"nc","effective_labels":{"goog-terraform-provisioned":"true"},"git_remote_settings":[],"kms_key_name":null,"labels":null,"name":"nc","npmrc_environment_variables_secret_version":null,"project":"test-project","region":"us-central1","service_account":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null,"workspace_compilation_overrides":[]},"sensitive_values":{"effective_labels":{},"git_remote_settings":[],"terraform_labels":{},"workspace_compilation_overrides":[]}}]}},"resource_changes":[{"address":"google_dataform_repository.c","mode":"managed","type":"google_dataform_repository","name":"c","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"deletion_policy":"DELETE","display_name":"c","effective_labels":{"goog-terraform-provisioned":"true"},"git_remote_settings":[],"kms_key_name":null,"labels":null,"name":"c","npmrc_environment_variables_secret_version":null,"project":"test-project","region":"australia-southeast1","service_account":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null,"workspace_compilation_overrides":[]},"after_unknown":{"effective_labels":{},"git_remote_settings":[],"id":true,"terraform_labels":{},"workspace_compilation_overrides":[]},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"git_remote_settings":[],"terraform_labels":{},"workspace_compilation_overrides":[]}}},{"address":"google_dataform_repository.nc","mode":"managed","type":"google_dataform_repository","name":"nc","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"deletion_policy":"DELETE","display_name":"nc","effective_labels":{"goog-terraform-provisioned":"true"},"git_remote_settings":[],"kms_key_name":null,"labels":null,"name":"nc","npmrc_environment_variables_secret_version":null,"project":"test-project","region":"us-central1","service_account":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null,"workspace_compilation_overrides":[]},"after_unknown":{"effective_labels":{},"git_remote_settings":[],"id":true,"terraform_labels":{},"workspace_compilation_overrides":[]},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"git_remote_settings":[],"terraform_labels":{},"workspace_compilation_overrides":[]}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"},"google-beta":{"name":"google-beta","full_name":"registry.terraform.io/hashicorp/google-beta"}},"root_module":{"resources":[{"address":"google_dataform_repository.c","mode":"managed","type":"google_dataform_repository","name":"c","provider_config_key":"google-beta","expressions":{"deletion_policy":{"constant_value":"DELETE"},"display_name":{"constant_value":"c"},"name":{"constant_value":"c"},"project":{"references":["var.project"]},"region":{"constant_value":"australia-southeast1"}},"schema_version":0},{"address":"google_dataform_repository.nc","mode":"managed","type":"google_dataform_repository","name":"nc","provider_config_key":"google-beta","expressions":{"display_name":{"constant_value":"nc"},"name":{"constant_value":"nc"},"project":{"references":["var.project"]},"region":{"constant_value":"us-central1"}},"schema_version":0}],"variables":{"project":{}}}},"timestamp":"2025-09-21T21:10:13Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/dataform/google_dataform_repository/region_allowlist/variables.tf b/inputs/gcp/dataform/google_dataform_repository/region_allowlist/variables.tf deleted file mode 100644 index f55349bff..000000000 --- a/inputs/gcp/dataform/google_dataform_repository/region_allowlist/variables.tf +++ /dev/null @@ -1,4 +0,0 @@ -variable "project" { - type = string -} - diff --git a/inputs/gcp/dataform/google_dataform_repository_iam/iam_no_public/plan.json b/inputs/gcp/dataform/google_dataform_repository_iam/iam_no_public/plan.json deleted file mode 100644 index 6b906359a..000000000 --- a/inputs/gcp/dataform/google_dataform_repository_iam/iam_no_public/plan.json +++ /dev/null @@ -1 +0,0 @@ -{"format_version":"1.2","terraform_version":"1.12.2","variables":{"project":{"value":"test-project"}},"planned_values":{"root_module":{"resources":[{"address":"google_dataform_repository.repo_c","mode":"managed","type":"google_dataform_repository","name":"repo_c","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"deletion_policy":"DELETE","display_name":"c","effective_labels":{"goog-terraform-provisioned":"true"},"git_remote_settings":[],"kms_key_name":null,"labels":null,"name":"c","npmrc_environment_variables_secret_version":null,"project":"test-project","region":"australia-southeast1","service_account":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null,"workspace_compilation_overrides":[]},"sensitive_values":{"effective_labels":{},"git_remote_settings":[],"terraform_labels":{},"workspace_compilation_overrides":[]}},{"address":"google_dataform_repository.repo_nc","mode":"managed","type":"google_dataform_repository","name":"repo_nc","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"deletion_policy":"DELETE","display_name":"nc","effective_labels":{"goog-terraform-provisioned":"true"},"git_remote_settings":[],"kms_key_name":null,"labels":null,"name":"nc","npmrc_environment_variables_secret_version":null,"project":"test-project","region":"us-central1","service_account":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null,"workspace_compilation_overrides":[]},"sensitive_values":{"effective_labels":{},"git_remote_settings":[],"terraform_labels":{},"workspace_compilation_overrides":[]}},{"address":"google_dataform_repository_iam_binding.c","mode":"managed","type":"google_dataform_repository_iam_binding","name":"c","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"members":["user:alice@example.com"],"project":"test-project","region":"australia-southeast1","repository":"projects/test-project/locations/australia-southeast1/repositories/c","role":"roles/dataform.viewer"},"sensitive_values":{}},{"address":"google_dataform_repository_iam_binding.nc","mode":"managed","type":"google_dataform_repository_iam_binding","name":"nc","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"members":["allUsers","user:bob@example.com"],"project":"test-project","region":"us-central1","repository":"projects/test-project/locations/us-central1/repositories/nc","role":"roles/viewer"},"sensitive_values":{}}]}},"resource_changes":[{"address":"google_dataform_repository.repo_c","mode":"managed","type":"google_dataform_repository","name":"repo_c","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"deletion_policy":"DELETE","display_name":"c","effective_labels":{"goog-terraform-provisioned":"true"},"git_remote_settings":[],"kms_key_name":null,"labels":null,"name":"c","npmrc_environment_variables_secret_version":null,"project":"test-project","region":"australia-southeast1","service_account":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null,"workspace_compilation_overrides":[]},"after_unknown":{"effective_labels":{},"git_remote_settings":[],"id":true,"terraform_labels":{},"workspace_compilation_overrides":[]},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"git_remote_settings":[],"terraform_labels":{},"workspace_compilation_overrides":[]}}},{"address":"google_dataform_repository.repo_nc","mode":"managed","type":"google_dataform_repository","name":"repo_nc","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"deletion_policy":"DELETE","display_name":"nc","effective_labels":{"goog-terraform-provisioned":"true"},"git_remote_settings":[],"kms_key_name":null,"labels":null,"name":"nc","npmrc_environment_variables_secret_version":null,"project":"test-project","region":"us-central1","service_account":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null,"workspace_compilation_overrides":[]},"after_unknown":{"effective_labels":{},"git_remote_settings":[],"id":true,"terraform_labels":{},"workspace_compilation_overrides":[]},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"git_remote_settings":[],"terraform_labels":{},"workspace_compilation_overrides":[]}}},{"address":"google_dataform_repository_iam_binding.c","mode":"managed","type":"google_dataform_repository_iam_binding","name":"c","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"members":["user:alice@example.com"],"project":"test-project","region":"australia-southeast1","repository":"projects/test-project/locations/australia-southeast1/repositories/c","role":"roles/dataform.viewer"},"after_unknown":{"etag":true,"id":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"google_dataform_repository_iam_binding.nc","mode":"managed","type":"google_dataform_repository_iam_binding","name":"nc","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"members":["allUsers","user:bob@example.com"],"project":"test-project","region":"us-central1","repository":"projects/test-project/locations/us-central1/repositories/nc","role":"roles/viewer"},"after_unknown":{"etag":true,"id":true},"before_sensitive":false,"after_sensitive":{}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"},"google-beta":{"name":"google-beta","full_name":"registry.terraform.io/hashicorp/google-beta"}},"root_module":{"resources":[{"address":"google_dataform_repository.repo_c","mode":"managed","type":"google_dataform_repository","name":"repo_c","provider_config_key":"google-beta","expressions":{"display_name":{"constant_value":"c"},"name":{"constant_value":"c"},"project":{"references":["var.project"]},"region":{"constant_value":"australia-southeast1"}},"schema_version":0},{"address":"google_dataform_repository.repo_nc","mode":"managed","type":"google_dataform_repository","name":"repo_nc","provider_config_key":"google-beta","expressions":{"display_name":{"constant_value":"nc"},"name":{"constant_value":"nc"},"project":{"references":["var.project"]},"region":{"constant_value":"us-central1"}},"schema_version":0},{"address":"google_dataform_repository_iam_binding.c","mode":"managed","type":"google_dataform_repository_iam_binding","name":"c","provider_config_key":"google-beta","expressions":{"members":[{"constant_value":"user:alice@example.com"}],"project":{"references":["var.project"]},"region":{"references":["google_dataform_repository.repo_c.region"]},"repository":{"references":["google_dataform_repository.repo_c"]},"role":{"constant_value":"roles/dataform.viewer"}},"schema_version":0},{"address":"google_dataform_repository_iam_binding.nc","mode":"managed","type":"google_dataform_repository_iam_binding","name":"nc","provider_config_key":"google-beta","expressions":{"members":[{"constant_value":"user:bob@example.com"},{"constant_value":"allUsers"}],"project":{"references":["var.project"]},"region":{"references":["google_dataform_repository.repo_nc.region"]},"repository":{"references":["google_dataform_repository.repo_nc"]},"role":{"constant_value":"roles/viewer"}},"schema_version":0}],"variables":{"project":{}}}},"timestamp":"2025-09-21T22:00:00Z","applyable":true,"complete":true,"errored":false} \ No newline at end of file diff --git a/inputs/gcp/dataform/google_dataform_repository_iam/iam_no_public/variables.tf b/inputs/gcp/dataform/google_dataform_repository_iam/iam_no_public/variables.tf index e400d342b..06bb753eb 100644 --- a/inputs/gcp/dataform/google_dataform_repository_iam/iam_no_public/variables.tf +++ b/inputs/gcp/dataform/google_dataform_repository_iam/iam_no_public/variables.tf @@ -1,3 +1,4 @@ -variable "project" { type = string } - - +variable "project" { + type = string + default = "reliable-alpha-478205-k9" +} \ No newline at end of file diff --git a/inputs/gcp/dataform/google_dataform_repository_release_config/cron_required/plan.json b/inputs/gcp/dataform/google_dataform_repository_release_config/cron_required/plan.json deleted file mode 100644 index 1a91b667a..000000000 --- a/inputs/gcp/dataform/google_dataform_repository_release_config/cron_required/plan.json +++ /dev/null @@ -1 +0,0 @@ -{"format_version":"1.2","terraform_version":"1.12.2","variables":{"project":{"value":"test-project"}},"planned_values":{"root_module":{"resources":[{"address":"google_dataform_repository.repo_c","mode":"managed","type":"google_dataform_repository","name":"repo_c","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"deletion_policy":"DELETE","display_name":"c","effective_labels":{"goog-terraform-provisioned":"true"},"git_remote_settings":[],"kms_key_name":null,"labels":null,"name":"c","npmrc_environment_variables_secret_version":null,"project":"test-project","region":"australia-southeast1","service_account":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null,"workspace_compilation_overrides":[]},"sensitive_values":{"effective_labels":{},"git_remote_settings":[],"terraform_labels":{},"workspace_compilation_overrides":[]}},{"address":"google_dataform_repository.repo_nc","mode":"managed","type":"google_dataform_repository","name":"repo_nc","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"deletion_policy":"DELETE","display_name":"nc","effective_labels":{"goog-terraform-provisioned":"true"},"git_remote_settings":[],"kms_key_name":null,"labels":null,"name":"nc","npmrc_environment_variables_secret_version":null,"project":"test-project","region":"us-central1","service_account":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null,"workspace_compilation_overrides":[]},"sensitive_values":{"effective_labels":{},"git_remote_settings":[],"terraform_labels":{},"workspace_compilation_overrides":[]}},{"address":"google_dataform_repository_release_config.c","mode":"managed","type":"google_dataform_repository_release_config","name":"c","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"cron_schedule":"0 2 * * *","git_commitish":"main","name":"c","project":"test-project","region":"australia-southeast1","repository":"projects/test-project/locations/australia-southeast1/repositories/c"},"sensitive_values":{}},{"address":"google_dataform_repository_release_config.nc","mode":"managed","type":"google_dataform_repository_release_config","name":"nc","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"cron_schedule":null,"git_commitish":"main","name":"nc","project":"test-project","region":"us-central1","repository":"projects/test-project/locations/us-central1/repositories/nc"},"sensitive_values":{}}]}},"resource_changes":[{"address":"google_dataform_repository.repo_c","mode":"managed","type":"google_dataform_repository","name":"repo_c","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"deletion_policy":"DELETE","display_name":"c","effective_labels":{"goog-terraform-provisioned":"true"},"git_remote_settings":[],"kms_key_name":null,"labels":null,"name":"c","npmrc_environment_variables_secret_version":null,"project":"test-project","region":"australia-southeast1","service_account":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null,"workspace_compilation_overrides":[]},"after_unknown":{"effective_labels":{},"git_remote_settings":[],"id":true,"terraform_labels":{},"workspace_compilation_overrides":[]},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"git_remote_settings":[],"terraform_labels":{},"workspace_compilation_overrides":[]}}},{"address":"google_dataform_repository.repo_nc","mode":"managed","type":"google_dataform_repository","name":"repo_nc","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"deletion_policy":"DELETE","display_name":"nc","effective_labels":{"goog-terraform-provisioned":"true"},"git_remote_settings":[],"kms_key_name":null,"labels":null,"name":"nc","npmrc_environment_variables_secret_version":null,"project":"test-project","region":"us-central1","service_account":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null,"workspace_compilation_overrides":[]},"after_unknown":{"effective_labels":{},"git_remote_settings":[],"id":true,"terraform_labels":{},"workspace_compilation_overrides":[]},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"git_remote_settings":[],"terraform_labels":{},"workspace_compilation_overrides":[]}}},{"address":"google_dataform_repository_release_config.c","mode":"managed","type":"google_dataform_repository_release_config","name":"c","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"cron_schedule":"0 2 * * *","git_commitish":"main","name":"c","project":"test-project","region":"australia-southeast1","repository":"projects/test-project/locations/australia-southeast1/repositories/c"},"after_unknown":{"id":true,"recent_scheduled_release_records":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"google_dataform_repository_release_config.nc","mode":"managed","type":"google_dataform_repository_release_config","name":"nc","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"cron_schedule":null,"git_commitish":"main","name":"nc","project":"test-project","region":"us-central1","repository":"projects/test-project/locations/us-central1/repositories/nc"},"after_unknown":{"id":true,"recent_scheduled_release_records":true},"before_sensitive":false,"after_sensitive":{}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"},"google-beta":{"name":"google-beta","full_name":"registry.terraform.io/hashicorp/google-beta"}},"root_module":{"resources":[{"address":"google_dataform_repository.repo_c","mode":"managed","type":"google_dataform_repository","name":"repo_c","provider_config_key":"google-beta","expressions":{"display_name":{"constant_value":"c"},"name":{"constant_value":"c"},"project":{"references":["var.project"]},"region":{"constant_value":"australia-southeast1"}},"schema_version":0},{"address":"google_dataform_repository.repo_nc","mode":"managed","type":"google_dataform_repository","name":"repo_nc","provider_config_key":"google-beta","expressions":{"display_name":{"constant_value":"nc"},"name":{"constant_value":"nc"},"project":{"references":["var.project"]},"region":{"constant_value":"us-central1"}},"schema_version":0},{"address":"google_dataform_repository_release_config.c","mode":"managed","type":"google_dataform_repository_release_config","name":"c","provider_config_key":"google-beta","expressions":{"cron_schedule":{"constant_value":"0 2 * * *"},"git_commitish":{"constant_value":"main"},"name":{"constant_value":"c"},"project":{"references":["var.project"]},"region":{"references":["google_dataform_repository.repo_c.region"]},"repository":{"references":["google_dataform_repository.repo_c"]}},"schema_version":0},{"address":"google_dataform_repository_release_config.nc","mode":"managed","type":"google_dataform_repository_release_config","name":"nc","provider_config_key":"google-beta","expressions":{"git_commitish":{"constant_value":"main"},"name":{"constant_value":"nc"},"project":{"references":["var.project"]},"region":{"references":["google_dataform_repository.repo_nc.region"]},"repository":{"references":["google_dataform_repository.repo_nc"]}},"schema_version":0}],"variables":{"project":{}}}},"timestamp":"2025-09-21T22:10:00Z","applyable":true,"complete":true,"errored":false} \ No newline at end of file diff --git a/inputs/gcp/dataform/google_dataform_repository_release_config/cron_required/variables.tf b/inputs/gcp/dataform/google_dataform_repository_release_config/cron_required/variables.tf index e400d342b..06bb753eb 100644 --- a/inputs/gcp/dataform/google_dataform_repository_release_config/cron_required/variables.tf +++ b/inputs/gcp/dataform/google_dataform_repository_release_config/cron_required/variables.tf @@ -1,3 +1,4 @@ -variable "project" { type = string } - - +variable "project" { + type = string + default = "reliable-alpha-478205-k9" +} \ No newline at end of file diff --git a/inputs/gcp/dataform/google_dataform_repository_workflow_config/service_account_required/plan.json b/inputs/gcp/dataform/google_dataform_repository_workflow_config/service_account_required/plan.json deleted file mode 100644 index bba6fcf24..000000000 --- a/inputs/gcp/dataform/google_dataform_repository_workflow_config/service_account_required/plan.json +++ /dev/null @@ -1 +0,0 @@ -{"format_version":"1.2","terraform_version":"1.12.2","variables":{"project":{"value":"test-project"}},"planned_values":{"root_module":{"resources":[{"address":"google_dataform_repository.repo_c","mode":"managed","type":"google_dataform_repository","name":"repo_c","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"deletion_policy":"DELETE","display_name":"c","effective_labels":{"goog-terraform-provisioned":"true"},"git_remote_settings":[],"kms_key_name":null,"labels":null,"name":"c","npmrc_environment_variables_secret_version":null,"project":"test-project","region":"australia-southeast1","service_account":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null,"workspace_compilation_overrides":[]},"sensitive_values":{"effective_labels":{},"git_remote_settings":[],"terraform_labels":{},"workspace_compilation_overrides":[]}},{"address":"google_dataform_repository.repo_nc","mode":"managed","type":"google_dataform_repository","name":"repo_nc","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"deletion_policy":"DELETE","display_name":"nc","effective_labels":{"goog-terraform-provisioned":"true"},"git_remote_settings":[],"kms_key_name":null,"labels":null,"name":"nc","npmrc_environment_variables_secret_version":null,"project":"test-project","region":"us-central1","service_account":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null,"workspace_compilation_overrides":[]},"sensitive_values":{"effective_labels":{},"git_remote_settings":[],"terraform_labels":{},"workspace_compilation_overrides":[]}},{"address":"google_dataform_repository_release_config.rel_c","mode":"managed","type":"google_dataform_repository_release_config","name":"rel_c","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"cron_schedule":"0 3 * * *","git_commitish":"main","name":"c","project":"test-project","region":"australia-southeast1","repository":"projects/test-project/locations/australia-southeast1/repositories/c"},"sensitive_values":{}},{"address":"google_dataform_repository_release_config.rel_nc","mode":"managed","type":"google_dataform_repository_release_config","name":"rel_nc","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"cron_schedule":"0 3 * * *","git_commitish":"main","name":"nc","project":"test-project","region":"us-central1","repository":"projects/test-project/locations/us-central1/repositories/nc"},"sensitive_values":{}},{"address":"google_dataform_repository_workflow_config.c","mode":"managed","type":"google_dataform_repository_workflow_config","name":"c","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"invocation_config":[{"service_account":"sa@project.iam.gserviceaccount.com"}],"name":"c","project":"test-project","region":"australia-southeast1","release_config":"c","repository":"projects/test-project/locations/australia-southeast1/repositories/c"},"sensitive_values":{}},{"address":"google_dataform_repository_workflow_config.nc","mode":"managed","type":"google_dataform_repository_workflow_config","name":"nc","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"invocation_config":[{"service_account":null}],"name":"nc","project":"test-project","region":"us-central1","release_config":"nc","repository":"projects/test-project/locations/us-central1/repositories/nc"},"sensitive_values":{}}]}},"resource_changes":[{"address":"google_dataform_repository.repo_c","mode":"managed","type":"google_dataform_repository","name":"repo_c","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"deletion_policy":"DELETE","display_name":"c","effective_labels":{"goog-terraform-provisioned":"true"},"git_remote_settings":[],"kms_key_name":null,"labels":null,"name":"c","npmrc_environment_variables_secret_version":null,"project":"test-project","region":"australia-southeast1","service_account":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null,"workspace_compilation_overrides":[]},"after_unknown":{"effective_labels":{},"git_remote_settings":[],"id":true,"terraform_labels":{},"workspace_compilation_overrides":[]},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"git_remote_settings":[],"terraform_labels":{},"workspace_compilation_overrides":[]}}},{"address":"google_dataform_repository.repo_nc","mode":"managed","type":"google_dataform_repository","name":"repo_nc","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"deletion_policy":"DELETE","display_name":"nc","effective_labels":{"goog-terraform-provisioned":"true"},"git_remote_settings":[],"kms_key_name":null,"labels":null,"name":"nc","npmrc_environment_variables_secret_version":null,"project":"test-project","region":"us-central1","service_account":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null,"workspace_compilation_overrides":[]},"after_unknown":{"effective_labels":{},"git_remote_settings":[],"id":true,"terraform_labels":{},"workspace_compilation_overrides":[]},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"git_remote_settings":[],"terraform_labels":{},"workspace_compilation_overrides":[]}}},{"address":"google_dataform_repository_release_config.rel_c","mode":"managed","type":"google_dataform_repository_release_config","name":"rel_c","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"cron_schedule":"0 3 * * *","git_commitish":"main","name":"c","project":"test-project","region":"australia-southeast1","repository":"projects/test-project/locations/australia-southeast1/repositories/c"},"after_unknown":{"id":true,"recent_scheduled_release_records":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"google_dataform_repository_release_config.rel_nc","mode":"managed","type":"google_dataform_repository_release_config","name":"rel_nc","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"cron_schedule":"0 3 * * *","git_commitish":"main","name":"nc","project":"test-project","region":"us-central1","repository":"projects/test-project/locations/us-central1/repositories/nc"},"after_unknown":{"id":true,"recent_scheduled_release_records":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"google_dataform_repository_workflow_config.c","mode":"managed","type":"google_dataform_repository_workflow_config","name":"c","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"invocation_config":[{"service_account":"sa@project.iam.gserviceaccount.com"}],"name":"c","project":"test-project","region":"australia-southeast1","release_config":"c","repository":"projects/test-project/locations/australia-southeast1/repositories/c"},"after_unknown":{"id":true,"recent_scheduled_execution_records":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"google_dataform_repository_workflow_config.nc","mode":"managed","type":"google_dataform_repository_workflow_config","name":"nc","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"invocation_config":[{"service_account":null}],"name":"nc","project":"test-project","region":"us-central1","release_config":"nc","repository":"projects/test-project/locations/us-central1/repositories/nc"},"after_unknown":{"id":true,"recent_scheduled_execution_records":true},"before_sensitive":false,"after_sensitive":{}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"},"google-beta":{"name":"google-beta","full_name":"registry.terraform.io/hashicorp/google-beta"}},"root_module":{"resources":[{"address":"google_dataform_repository.repo_c","mode":"managed","type":"google_dataform_repository","name":"repo_c","provider_config_key":"google-beta","expressions":{"display_name":{"constant_value":"c"},"name":{"constant_value":"c"},"project":{"references":["var.project"]},"region":{"constant_value":"australia-southeast1"}},"schema_version":0},{"address":"google_dataform_repository.repo_nc","mode":"managed","type":"google_dataform_repository","name":"repo_nc","provider_config_key":"google-beta","expressions":{"display_name":{"constant_value":"nc"},"name":{"constant_value":"nc"},"project":{"references":["var.project"]},"region":{"constant_value":"us-central1"}},"schema_version":0},{"address":"google_dataform_repository_release_config.rel_c","mode":"managed","type":"google_dataform_repository_release_config","name":"rel_c","provider_config_key":"google-beta","expressions":{"cron_schedule":{"constant_value":"0 3 * * *"},"git_commitish":{"constant_value":"main"},"name":{"constant_value":"c"},"project":{"references":["var.project"]},"region":{"references":["google_dataform_repository.repo_c.region"]},"repository":{"references":["google_dataform_repository.repo_c"]}},"schema_version":0},{"address":"google_dataform_repository_release_config.rel_nc","mode":"managed","type":"google_dataform_repository_release_config","name":"rel_nc","provider_config_key":"google-beta","expressions":{"cron_schedule":{"constant_value":"0 3 * * *"},"git_commitish":{"constant_value":"main"},"name":{"constant_value":"nc"},"project":{"references":["var.project"]},"region":{"references":["google_dataform_repository.repo_nc.region"]},"repository":{"references":["google_dataform_repository.repo_nc"]}},"schema_version":0},{"address":"google_dataform_repository_workflow_config.c","mode":"managed","type":"google_dataform_repository_workflow_config","name":"c","provider_config_key":"google-beta","expressions":{"invocation_config":[{"service_account":{"constant_value":"sa@project.iam.gserviceaccount.com"}}],"name":{"constant_value":"c"},"project":{"references":["var.project"]},"region":{"references":["google_dataform_repository.repo_c.region"]},"release_config":{"references":["google_dataform_repository_release_config.rel_c.name"]},"repository":{"references":["google_dataform_repository.repo_c"]}},"schema_version":0},{"address":"google_dataform_repository_workflow_config.nc","mode":"managed","type":"google_dataform_repository_workflow_config","name":"nc","provider_config_key":"google-beta","expressions":{"invocation_config":[{}],"name":{"constant_value":"nc"},"project":{"references":["var.project"]},"region":{"references":["google_dataform_repository.repo_nc.region"]},"release_config":{"references":["google_dataform_repository_release_config.rel_nc.name"]},"repository":{"references":["google_dataform_repository.repo_nc"]}},"schema_version":0}],"variables":{"project":{}}}},"timestamp":"2025-09-21T22:20:00Z","applyable":true,"complete":true,"errored":false} \ No newline at end of file diff --git a/inputs/gcp/dataform/google_dataform_repository_workflow_config/service_account_required/variables.tf b/inputs/gcp/dataform/google_dataform_repository_workflow_config/service_account_required/variables.tf index e400d342b..06bb753eb 100644 --- a/inputs/gcp/dataform/google_dataform_repository_workflow_config/service_account_required/variables.tf +++ b/inputs/gcp/dataform/google_dataform_repository_workflow_config/service_account_required/variables.tf @@ -1,3 +1,4 @@ -variable "project" { type = string } - - +variable "project" { + type = string + default = "reliable-alpha-478205-k9" +} \ No newline at end of file diff --git a/inputs/gcp/dataproc_metastore/federation/deletion_protection/.terraform.lock.hcl b/inputs/gcp/dataproc_metastore/federation/deletion_protection/.terraform.lock.hcl index 307331daf..5698484ba 100644 --- a/inputs/gcp/dataproc_metastore/federation/deletion_protection/.terraform.lock.hcl +++ b/inputs/gcp/dataproc_metastore/federation/deletion_protection/.terraform.lock.hcl @@ -2,20 +2,20 @@ # Manual edits may be lost in future updates. provider "registry.terraform.io/hashicorp/google" { - version = "6.48.0" + version = "7.16.0" hashes = [ - "h1:rfboi/oqg/pRsCmraLdZdNX2uGzuaOgaXkSWcS1nhTQ=", - "zh:3640317ada2141ab5b54b5c5c2b1d0f60af861fb9788f05808b5d5d7ac8d1819", - "zh:4ec6082c343d7ea097bf725c7f550978789860f43b442a7709e1a4ca209d10a7", - "zh:66dcb85612f82c464a682e03a20e9dfd479e743d63a7e9cf754dcf81fa6e442b", - "zh:88ce6cb6f2f5f3a356c27ca5923594d272ea25801ed81026e102a2dc24d347d3", - "zh:b62e3715bf35fe0322b2a56c5072ecfdea2dd25f1c794f432acd1dd0105112b5", - "zh:bc2a9397c6d9b71ccf74cea442e74d8bb5603d491aa4a7cd88d5c44693674e16", - "zh:c6710acbdbaeca8307467186b0cc5184c8223fd0efa8c52e7f81310f34c68c69", - "zh:ca077af69ab66444bf027b7663e1386f2d14699b50562d1674c84522316bf52a", - "zh:e1b74bcdacb20d73da0470f6874dc7ac38b58bfa738ec5e337fcc7c5a4f32663", - "zh:e9b2dcd583025b69b7e80c9ad0d9ee4ed91e731f2073db5b6516978cf7617017", - "zh:f0d4ef4a8ca749b9102b152aafc093fa7def2afbda771b6b26cbc873f4e6dfc8", + "h1:o+dOw75zzgpJAUdjEa2a2T62OEThcEr52/4CymRAewA=", + "zh:1cd6f0926e5884998965675d3fbdc5e5abd7335d3f5f83571226be7f50f44443", + "zh:2bc3e3db662df08755af37d23c856f0ec3b8474f629f042ad3af228ff1c3cb5a", + "zh:41869013f786bff8c2ba35e203e84b6c3ec9ff623d6cea6796f5f0204719e907", + "zh:493213e16cb8de6a39b0d6b327faab7909f32ad973fb937d2b3bc4faa07c911a", + "zh:5e9df66ddeef9fcf77acd6185fe880e6b3725b98850ea3b47ef726c44dc04a71", + "zh:6b9e8f83316cf660549a4032342107bb41a7e549eba923f69aefa1ae5ab80a3f", + "zh:6da9316ca7c70d4997c4a62cd534f674e02888e351cb189f7b77b5a03e803773", + "zh:7d1b1dc7c04924dd203e9c5d2041fb732b1e2556b4041c9272a786d37924be7c", + "zh:86dcafef126ad72b592582d8fdb2591d8a2cb45ff85e5f5ff0ac76fbbd7be1bb", + "zh:8a8994c67297336ede3ded9d2558104d49de6fdfa85b88dc99b50030d68158cf", + "zh:a67d8b4774cdb45fb13e73e15885e229561a8b8f46d9f0069b81bf4d3ca03c4a", "zh:f569b65999264a9416862bca5cd2a6177d94ccb0424f3a4ef424428912b9cb3c", ] } diff --git a/inputs/gcp/dataproc_metastore/federation/deletion_protection/c.tf b/inputs/gcp/dataproc_metastore/federation/deletion_protection/c.tf index 475ff4e4a..13090b92a 100644 --- a/inputs/gcp/dataproc_metastore/federation/deletion_protection/c.tf +++ b/inputs/gcp/dataproc_metastore/federation/deletion_protection/c.tf @@ -1,6 +1,6 @@ resource "google_dataproc_metastore_federation" "c" { version = "3.1.2" - federation_id = "metastore-fed" + federation_id = "c" deletion_protection = false project = 1 diff --git a/inputs/gcp/dataproc_metastore/federation/deletion_protection/nc.tf b/inputs/gcp/dataproc_metastore/federation/deletion_protection/nc.tf index a94f5b09a..149408761 100644 --- a/inputs/gcp/dataproc_metastore/federation/deletion_protection/nc.tf +++ b/inputs/gcp/dataproc_metastore/federation/deletion_protection/nc.tf @@ -1,6 +1,6 @@ resource "google_dataproc_metastore_federation" "nc" { version = "3.0.0" - federation_id = "_metastore-fed" + federation_id = "nc" deletion_protection = true project = 1 diff --git a/inputs/gcp/dataproc_metastore/federation/deletion_protection/plan.json b/inputs/gcp/dataproc_metastore/federation/deletion_protection/plan.json new file mode 100644 index 000000000..1d5c998d6 --- /dev/null +++ b/inputs/gcp/dataproc_metastore/federation/deletion_protection/plan.json @@ -0,0 +1 @@ +{"format_version":"1.2","terraform_version":"1.13.3","planned_values":{"root_module":{"resources":[{"address":"google_dataproc_metastore_federation.c","mode":"managed","type":"google_dataproc_metastore_federation","name":"c","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"backend_metastores":[{"metastore_type":"DATAPROC_METASTORE","name":"projects/acme-data-01/locations/australia-southeast2/services/hive-prod","rank":"5"}],"deletion_protection":false,"effective_labels":{"goog-terraform-provisioned":"true"},"federation_id":"c","labels":null,"location":null,"project":"1","tags":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null,"version":"3.1.2"},"sensitive_values":{"backend_metastores":[{}],"effective_labels":{},"terraform_labels":{}}},{"address":"google_dataproc_metastore_federation.nc","mode":"managed","type":"google_dataproc_metastore_federation","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"backend_metastores":[{"metastore_type":"METASTORE_TYPE_UNSPECIFIED","name":"projects/acme-data-01/locations/us-central1/services/hive-test","rank":"0"}],"deletion_protection":true,"effective_labels":{"goog-terraform-provisioned":"true"},"federation_id":"nc","labels":null,"location":null,"project":"1","tags":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null,"version":"3.0.0"},"sensitive_values":{"backend_metastores":[{}],"effective_labels":{},"terraform_labels":{}}}]}},"resource_changes":[{"address":"google_dataproc_metastore_federation.c","mode":"managed","type":"google_dataproc_metastore_federation","name":"c","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"backend_metastores":[{"metastore_type":"DATAPROC_METASTORE","name":"projects/acme-data-01/locations/australia-southeast2/services/hive-prod","rank":"5"}],"deletion_protection":false,"effective_labels":{"goog-terraform-provisioned":"true"},"federation_id":"c","labels":null,"location":null,"project":"1","tags":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null,"version":"3.1.2"},"after_unknown":{"backend_metastores":[{}],"create_time":true,"effective_labels":{},"endpoint_uri":true,"id":true,"name":true,"state":true,"state_message":true,"terraform_labels":{},"uid":true,"update_time":true},"before_sensitive":false,"after_sensitive":{"backend_metastores":[{}],"effective_labels":{},"terraform_labels":{}}}},{"address":"google_dataproc_metastore_federation.nc","mode":"managed","type":"google_dataproc_metastore_federation","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"backend_metastores":[{"metastore_type":"METASTORE_TYPE_UNSPECIFIED","name":"projects/acme-data-01/locations/us-central1/services/hive-test","rank":"0"}],"deletion_protection":true,"effective_labels":{"goog-terraform-provisioned":"true"},"federation_id":"nc","labels":null,"location":null,"project":"1","tags":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null,"version":"3.0.0"},"after_unknown":{"backend_metastores":[{}],"create_time":true,"effective_labels":{},"endpoint_uri":true,"id":true,"name":true,"state":true,"state_message":true,"terraform_labels":{},"uid":true,"update_time":true},"before_sensitive":false,"after_sensitive":{"backend_metastores":[{}],"effective_labels":{},"terraform_labels":{}}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_dataproc_metastore_federation.c","mode":"managed","type":"google_dataproc_metastore_federation","name":"c","provider_config_key":"google","expressions":{"backend_metastores":[{"metastore_type":{"constant_value":"DATAPROC_METASTORE"},"name":{"constant_value":"projects/acme-data-01/locations/australia-southeast2/services/hive-prod"},"rank":{"constant_value":5}}],"deletion_protection":{"constant_value":false},"federation_id":{"constant_value":"c"},"project":{"constant_value":1},"version":{"constant_value":"3.1.2"}},"schema_version":0},{"address":"google_dataproc_metastore_federation.nc","mode":"managed","type":"google_dataproc_metastore_federation","name":"nc","provider_config_key":"google","expressions":{"backend_metastores":[{"metastore_type":{"constant_value":"METASTORE_TYPE_UNSPECIFIED"},"name":{"constant_value":"projects/acme-data-01/locations/us-central1/services/hive-test"},"rank":{"constant_value":0}}],"deletion_protection":{"constant_value":true},"federation_id":{"constant_value":"nc"},"project":{"constant_value":1},"version":{"constant_value":"3.0.0"}},"schema_version":0}]}},"timestamp":"2026-02-05T03:08:44Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/dataproc_metastore/federation/location/c.tf b/inputs/gcp/dataproc_metastore/federation/location/c.tf index fd9a63c28..b28db4b48 100644 --- a/inputs/gcp/dataproc_metastore/federation/location/c.tf +++ b/inputs/gcp/dataproc_metastore/federation/location/c.tf @@ -1,6 +1,6 @@ resource "google_dataproc_metastore_federation" "c" { version = "3.1.2" - federation_id = "metastore-fed" + federation_id = "c" location = "australia-southeast2" project = 2 diff --git a/inputs/gcp/dataproc_metastore/federation/location/nc.tf b/inputs/gcp/dataproc_metastore/federation/location/nc.tf index 9518f2edb..75a6f6eb1 100644 --- a/inputs/gcp/dataproc_metastore/federation/location/nc.tf +++ b/inputs/gcp/dataproc_metastore/federation/location/nc.tf @@ -1,6 +1,6 @@ resource "google_dataproc_metastore_federation" "nc" { version = "3.0.0" - federation_id = "metastore-fed" + federation_id = "nc" location = "global" project = 2 diff --git a/inputs/gcp/dataproc_metastore/federation/location/plan.json b/inputs/gcp/dataproc_metastore/federation/location/plan.json new file mode 100644 index 000000000..061314e96 --- /dev/null +++ b/inputs/gcp/dataproc_metastore/federation/location/plan.json @@ -0,0 +1 @@ +{"format_version":"1.2","terraform_version":"1.13.3","planned_values":{"root_module":{"resources":[{"address":"google_dataproc_metastore_federation.c","mode":"managed","type":"google_dataproc_metastore_federation","name":"c","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"backend_metastores":[{"metastore_type":"DATAPROC_METASTORE","name":"projects/acme-data-01/locations/australia-southeast2/services/hive-prod","rank":"0"}],"deletion_protection":false,"effective_labels":{"goog-terraform-provisioned":"true"},"federation_id":"c","labels":null,"location":"australia-southeast2","project":"2","terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null,"version":"3.1.2"},"sensitive_values":{"backend_metastores":[{}],"effective_labels":{},"terraform_labels":{}}},{"address":"google_dataproc_metastore_federation.nc","mode":"managed","type":"google_dataproc_metastore_federation","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"backend_metastores":[{"metastore_type":"METASTORE_TYPE_UNSPECIFIED","name":"projects/acme-data-01/locations/us-central1/services/hive-test","rank":"5"}],"deletion_protection":false,"effective_labels":{"goog-terraform-provisioned":"true"},"federation_id":"nc","labels":null,"location":"global","project":"2","terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null,"version":"3.0.0"},"sensitive_values":{"backend_metastores":[{}],"effective_labels":{},"terraform_labels":{}}}]}},"resource_changes":[{"address":"google_dataproc_metastore_federation.c","mode":"managed","type":"google_dataproc_metastore_federation","name":"c","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"backend_metastores":[{"metastore_type":"DATAPROC_METASTORE","name":"projects/acme-data-01/locations/australia-southeast2/services/hive-prod","rank":"0"}],"deletion_protection":false,"effective_labels":{"goog-terraform-provisioned":"true"},"federation_id":"c","labels":null,"location":"australia-southeast2","project":"2","terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null,"version":"3.1.2"},"after_unknown":{"backend_metastores":[{}],"create_time":true,"effective_labels":{},"endpoint_uri":true,"id":true,"name":true,"state":true,"state_message":true,"terraform_labels":{},"uid":true,"update_time":true},"before_sensitive":false,"after_sensitive":{"backend_metastores":[{}],"effective_labels":{},"terraform_labels":{}}}},{"address":"google_dataproc_metastore_federation.nc","mode":"managed","type":"google_dataproc_metastore_federation","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"backend_metastores":[{"metastore_type":"METASTORE_TYPE_UNSPECIFIED","name":"projects/acme-data-01/locations/us-central1/services/hive-test","rank":"5"}],"deletion_protection":false,"effective_labels":{"goog-terraform-provisioned":"true"},"federation_id":"nc","labels":null,"location":"global","project":"2","terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null,"version":"3.0.0"},"after_unknown":{"backend_metastores":[{}],"create_time":true,"effective_labels":{},"endpoint_uri":true,"id":true,"name":true,"state":true,"state_message":true,"terraform_labels":{},"uid":true,"update_time":true},"before_sensitive":false,"after_sensitive":{"backend_metastores":[{}],"effective_labels":{},"terraform_labels":{}}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_dataproc_metastore_federation.c","mode":"managed","type":"google_dataproc_metastore_federation","name":"c","provider_config_key":"google","expressions":{"backend_metastores":[{"metastore_type":{"constant_value":"DATAPROC_METASTORE"},"name":{"constant_value":"projects/acme-data-01/locations/australia-southeast2/services/hive-prod"},"rank":{"constant_value":0}}],"federation_id":{"constant_value":"c"},"location":{"constant_value":"australia-southeast2"},"project":{"constant_value":2},"version":{"constant_value":"3.1.2"}},"schema_version":0},{"address":"google_dataproc_metastore_federation.nc","mode":"managed","type":"google_dataproc_metastore_federation","name":"nc","provider_config_key":"google","expressions":{"backend_metastores":[{"metastore_type":{"constant_value":"METASTORE_TYPE_UNSPECIFIED"},"name":{"constant_value":"projects/acme-data-01/locations/us-central1/services/hive-test"},"rank":{"constant_value":5}}],"federation_id":{"constant_value":"nc"},"location":{"constant_value":"global"},"project":{"constant_value":2},"version":{"constant_value":"3.0.0"}},"schema_version":0}]}},"timestamp":"2026-02-05T03:08:44Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/dataproc_metastore/federation/metastore_type/.terraform.lock.hcl b/inputs/gcp/dataproc_metastore/federation/metastore_type/.terraform.lock.hcl index 151e79163..5698484ba 100644 --- a/inputs/gcp/dataproc_metastore/federation/metastore_type/.terraform.lock.hcl +++ b/inputs/gcp/dataproc_metastore/federation/metastore_type/.terraform.lock.hcl @@ -2,20 +2,20 @@ # Manual edits may be lost in future updates. provider "registry.terraform.io/hashicorp/google" { - version = "7.3.0" + version = "7.16.0" hashes = [ - "h1:1WxLeVFcyCHXxeujuSS2Alr72zMqDK4IaCQlGiROuD4=", - "zh:135c90b063f15c090ce82d99887032e495bbe6388764b666148ae78a776c4621", - "zh:47bb8721c29556b3b42f7c2ed73f8fdfb214609599ba819eebbe9ae33aab0e07", - "zh:532d385f6381eaee111d96296fcd9da7cdefb31b2afc81e36f390bd6ea1c5e99", - "zh:5c96018f5b722d2871ae2cf21dab9b05ec722270facd2e62393bcf89dc34852d", - "zh:703caf0829c30e3d166f61a7af208388840b384be1ec440b0955584856d22e30", - "zh:80b965cbe057eea5205c8bfd81fce642de7425dab86482f91bef136b3c1faaff", - "zh:a18b8178124d5dcd8a69bb6fc37206838f03699f2443e803142b1e2fde6f55d1", - "zh:bdddc969d92f5ecafbf762179e2291169a7e24214a52ff263aaf872b5cceb582", - "zh:e30f79beaf07618131a717734a58f7b5626c1c53d6cc14887c7098add73e0ccb", - "zh:e95fe5ec32e9eeff1d56379c84bee3fac0a7f12ea1b90f34ff7d88d469f56c23", + "h1:o+dOw75zzgpJAUdjEa2a2T62OEThcEr52/4CymRAewA=", + "zh:1cd6f0926e5884998965675d3fbdc5e5abd7335d3f5f83571226be7f50f44443", + "zh:2bc3e3db662df08755af37d23c856f0ec3b8474f629f042ad3af228ff1c3cb5a", + "zh:41869013f786bff8c2ba35e203e84b6c3ec9ff623d6cea6796f5f0204719e907", + "zh:493213e16cb8de6a39b0d6b327faab7909f32ad973fb937d2b3bc4faa07c911a", + "zh:5e9df66ddeef9fcf77acd6185fe880e6b3725b98850ea3b47ef726c44dc04a71", + "zh:6b9e8f83316cf660549a4032342107bb41a7e549eba923f69aefa1ae5ab80a3f", + "zh:6da9316ca7c70d4997c4a62cd534f674e02888e351cb189f7b77b5a03e803773", + "zh:7d1b1dc7c04924dd203e9c5d2041fb732b1e2556b4041c9272a786d37924be7c", + "zh:86dcafef126ad72b592582d8fdb2591d8a2cb45ff85e5f5ff0ac76fbbd7be1bb", + "zh:8a8994c67297336ede3ded9d2558104d49de6fdfa85b88dc99b50030d68158cf", + "zh:a67d8b4774cdb45fb13e73e15885e229561a8b8f46d9f0069b81bf4d3ca03c4a", "zh:f569b65999264a9416862bca5cd2a6177d94ccb0424f3a4ef424428912b9cb3c", - "zh:fec21ae17d9d4e814d65ff377fbe1e2543636aaa3439a8a7a3447e7623044a4e", ] } diff --git a/inputs/gcp/dataproc_metastore/federation/metastore_type/c.tf b/inputs/gcp/dataproc_metastore/federation/metastore_type/c.tf index 4f15198c1..144c7541f 100644 --- a/inputs/gcp/dataproc_metastore/federation/metastore_type/c.tf +++ b/inputs/gcp/dataproc_metastore/federation/metastore_type/c.tf @@ -1,11 +1,11 @@ resource "google_dataproc_metastore_federation" "c" { version = "3.1.2" - federation_id = "metastore-fed" + federation_id = "c" project = 1 backend_metastores { rank = 5 - metastore_type = "DATAPROC_METASTORE" + metastore_type = "BIGQUERY" name = "projects/acme-data-01/locations/australia-southeast2/services/hive-prod" } } diff --git a/inputs/gcp/dataproc_metastore/federation/metastore_type/nc.tf b/inputs/gcp/dataproc_metastore/federation/metastore_type/nc.tf index 41bbb2df2..441727380 100644 --- a/inputs/gcp/dataproc_metastore/federation/metastore_type/nc.tf +++ b/inputs/gcp/dataproc_metastore/federation/metastore_type/nc.tf @@ -1,6 +1,6 @@ resource "google_dataproc_metastore_federation" "nc" { version = "3.0.0" - federation_id = "_metastore-fed" + federation_id = "nc" project = 1 backend_metastores { diff --git a/inputs/gcp/dataproc_metastore/federation/metastore_type/plan.json b/inputs/gcp/dataproc_metastore/federation/metastore_type/plan.json new file mode 100644 index 000000000..27330fb4b --- /dev/null +++ b/inputs/gcp/dataproc_metastore/federation/metastore_type/plan.json @@ -0,0 +1 @@ +{"format_version":"1.2","terraform_version":"1.13.3","planned_values":{"root_module":{"resources":[{"address":"google_dataproc_metastore_federation.c","mode":"managed","type":"google_dataproc_metastore_federation","name":"c","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"backend_metastores":[{"metastore_type":"BIGQUERY","name":"projects/acme-data-01/locations/australia-southeast2/services/hive-prod","rank":"5"}],"deletion_protection":false,"effective_labels":{"goog-terraform-provisioned":"true"},"federation_id":"c","labels":null,"location":null,"project":"1","tags":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null,"version":"3.1.2"},"sensitive_values":{"backend_metastores":[{}],"effective_labels":{},"terraform_labels":{}}},{"address":"google_dataproc_metastore_federation.nc","mode":"managed","type":"google_dataproc_metastore_federation","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"backend_metastores":[{"metastore_type":"METASTORE_TYPE_UNSPECIFIED","name":"projects/acme-data-01/locations/us-central1/services/hive-test","rank":"0"}],"deletion_protection":false,"effective_labels":{"goog-terraform-provisioned":"true"},"federation_id":"nc","labels":null,"location":null,"project":"1","tags":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null,"version":"3.0.0"},"sensitive_values":{"backend_metastores":[{}],"effective_labels":{},"terraform_labels":{}}}]}},"resource_changes":[{"address":"google_dataproc_metastore_federation.c","mode":"managed","type":"google_dataproc_metastore_federation","name":"c","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"backend_metastores":[{"metastore_type":"BIGQUERY","name":"projects/acme-data-01/locations/australia-southeast2/services/hive-prod","rank":"5"}],"deletion_protection":false,"effective_labels":{"goog-terraform-provisioned":"true"},"federation_id":"c","labels":null,"location":null,"project":"1","tags":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null,"version":"3.1.2"},"after_unknown":{"backend_metastores":[{}],"create_time":true,"effective_labels":{},"endpoint_uri":true,"id":true,"name":true,"state":true,"state_message":true,"terraform_labels":{},"uid":true,"update_time":true},"before_sensitive":false,"after_sensitive":{"backend_metastores":[{}],"effective_labels":{},"terraform_labels":{}}}},{"address":"google_dataproc_metastore_federation.nc","mode":"managed","type":"google_dataproc_metastore_federation","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"backend_metastores":[{"metastore_type":"METASTORE_TYPE_UNSPECIFIED","name":"projects/acme-data-01/locations/us-central1/services/hive-test","rank":"0"}],"deletion_protection":false,"effective_labels":{"goog-terraform-provisioned":"true"},"federation_id":"nc","labels":null,"location":null,"project":"1","tags":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null,"version":"3.0.0"},"after_unknown":{"backend_metastores":[{}],"create_time":true,"effective_labels":{},"endpoint_uri":true,"id":true,"name":true,"state":true,"state_message":true,"terraform_labels":{},"uid":true,"update_time":true},"before_sensitive":false,"after_sensitive":{"backend_metastores":[{}],"effective_labels":{},"terraform_labels":{}}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_dataproc_metastore_federation.c","mode":"managed","type":"google_dataproc_metastore_federation","name":"c","provider_config_key":"google","expressions":{"backend_metastores":[{"metastore_type":{"constant_value":"BIGQUERY"},"name":{"constant_value":"projects/acme-data-01/locations/australia-southeast2/services/hive-prod"},"rank":{"constant_value":5}}],"federation_id":{"constant_value":"c"},"project":{"constant_value":1},"version":{"constant_value":"3.1.2"}},"schema_version":0},{"address":"google_dataproc_metastore_federation.nc","mode":"managed","type":"google_dataproc_metastore_federation","name":"nc","provider_config_key":"google","expressions":{"backend_metastores":[{"metastore_type":{"constant_value":"METASTORE_TYPE_UNSPECIFIED"},"name":{"constant_value":"projects/acme-data-01/locations/us-central1/services/hive-test"},"rank":{"constant_value":0}}],"federation_id":{"constant_value":"nc"},"project":{"constant_value":1},"version":{"constant_value":"3.0.0"}},"schema_version":0}]}},"timestamp":"2026-02-05T03:08:44Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/dataproc_metastore/federation/name/.terraform.lock.hcl b/inputs/gcp/dataproc_metastore/federation/name/.terraform.lock.hcl index 151e79163..5698484ba 100644 --- a/inputs/gcp/dataproc_metastore/federation/name/.terraform.lock.hcl +++ b/inputs/gcp/dataproc_metastore/federation/name/.terraform.lock.hcl @@ -2,20 +2,20 @@ # Manual edits may be lost in future updates. provider "registry.terraform.io/hashicorp/google" { - version = "7.3.0" + version = "7.16.0" hashes = [ - "h1:1WxLeVFcyCHXxeujuSS2Alr72zMqDK4IaCQlGiROuD4=", - "zh:135c90b063f15c090ce82d99887032e495bbe6388764b666148ae78a776c4621", - "zh:47bb8721c29556b3b42f7c2ed73f8fdfb214609599ba819eebbe9ae33aab0e07", - "zh:532d385f6381eaee111d96296fcd9da7cdefb31b2afc81e36f390bd6ea1c5e99", - "zh:5c96018f5b722d2871ae2cf21dab9b05ec722270facd2e62393bcf89dc34852d", - "zh:703caf0829c30e3d166f61a7af208388840b384be1ec440b0955584856d22e30", - "zh:80b965cbe057eea5205c8bfd81fce642de7425dab86482f91bef136b3c1faaff", - "zh:a18b8178124d5dcd8a69bb6fc37206838f03699f2443e803142b1e2fde6f55d1", - "zh:bdddc969d92f5ecafbf762179e2291169a7e24214a52ff263aaf872b5cceb582", - "zh:e30f79beaf07618131a717734a58f7b5626c1c53d6cc14887c7098add73e0ccb", - "zh:e95fe5ec32e9eeff1d56379c84bee3fac0a7f12ea1b90f34ff7d88d469f56c23", + "h1:o+dOw75zzgpJAUdjEa2a2T62OEThcEr52/4CymRAewA=", + "zh:1cd6f0926e5884998965675d3fbdc5e5abd7335d3f5f83571226be7f50f44443", + "zh:2bc3e3db662df08755af37d23c856f0ec3b8474f629f042ad3af228ff1c3cb5a", + "zh:41869013f786bff8c2ba35e203e84b6c3ec9ff623d6cea6796f5f0204719e907", + "zh:493213e16cb8de6a39b0d6b327faab7909f32ad973fb937d2b3bc4faa07c911a", + "zh:5e9df66ddeef9fcf77acd6185fe880e6b3725b98850ea3b47ef726c44dc04a71", + "zh:6b9e8f83316cf660549a4032342107bb41a7e549eba923f69aefa1ae5ab80a3f", + "zh:6da9316ca7c70d4997c4a62cd534f674e02888e351cb189f7b77b5a03e803773", + "zh:7d1b1dc7c04924dd203e9c5d2041fb732b1e2556b4041c9272a786d37924be7c", + "zh:86dcafef126ad72b592582d8fdb2591d8a2cb45ff85e5f5ff0ac76fbbd7be1bb", + "zh:8a8994c67297336ede3ded9d2558104d49de6fdfa85b88dc99b50030d68158cf", + "zh:a67d8b4774cdb45fb13e73e15885e229561a8b8f46d9f0069b81bf4d3ca03c4a", "zh:f569b65999264a9416862bca5cd2a6177d94ccb0424f3a4ef424428912b9cb3c", - "zh:fec21ae17d9d4e814d65ff377fbe1e2543636aaa3439a8a7a3447e7623044a4e", ] } diff --git a/inputs/gcp/dataproc_metastore/federation/name/c.tf b/inputs/gcp/dataproc_metastore/federation/name/c.tf index 4f15198c1..ec642c7d4 100644 --- a/inputs/gcp/dataproc_metastore/federation/name/c.tf +++ b/inputs/gcp/dataproc_metastore/federation/name/c.tf @@ -1,12 +1,12 @@ resource "google_dataproc_metastore_federation" "c" { version = "3.1.2" - federation_id = "metastore-fed" + federation_id = "c" project = 1 backend_metastores { rank = 5 metastore_type = "DATAPROC_METASTORE" - name = "projects/acme-data-01/locations/australia-southeast2/services/hive-prod" + name = "projects/acme-data-01/locations/australia-southeast2/services/test" } } diff --git a/inputs/gcp/dataproc_metastore/federation/name/nc.tf b/inputs/gcp/dataproc_metastore/federation/name/nc.tf index a6a01c68e..6bd79f8b3 100644 --- a/inputs/gcp/dataproc_metastore/federation/name/nc.tf +++ b/inputs/gcp/dataproc_metastore/federation/name/nc.tf @@ -1,12 +1,12 @@ resource "google_dataproc_metastore_federation" "nc" { version = "3.0.0" - federation_id = "_metastore-fed" + federation_id = "nc" project = 1 backend_metastores { rank = 0 metastore_type = "METASTORE_TYPE_UNSPECIFIED" - name = "/us-central1/services/hive-test" + name = "projects/acme-data-01/locations/us-central1/services/test" } } diff --git a/inputs/gcp/dataproc_metastore/federation/name/plan.json b/inputs/gcp/dataproc_metastore/federation/name/plan.json new file mode 100644 index 000000000..67dfd2830 --- /dev/null +++ b/inputs/gcp/dataproc_metastore/federation/name/plan.json @@ -0,0 +1 @@ +{"format_version":"1.2","terraform_version":"1.13.3","planned_values":{"root_module":{"resources":[{"address":"google_dataproc_metastore_federation.c","mode":"managed","type":"google_dataproc_metastore_federation","name":"c","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"backend_metastores":[{"metastore_type":"DATAPROC_METASTORE","name":"projects/acme-data-01/locations/australia-southeast2/services/test","rank":"5"}],"deletion_protection":false,"effective_labels":{"goog-terraform-provisioned":"true"},"federation_id":"c","labels":null,"location":null,"project":"1","tags":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null,"version":"3.1.2"},"sensitive_values":{"backend_metastores":[{}],"effective_labels":{},"terraform_labels":{}}},{"address":"google_dataproc_metastore_federation.nc","mode":"managed","type":"google_dataproc_metastore_federation","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"backend_metastores":[{"metastore_type":"METASTORE_TYPE_UNSPECIFIED","name":"projects/acme-data-01/locations/us-central1/services/test","rank":"0"}],"deletion_protection":false,"effective_labels":{"goog-terraform-provisioned":"true"},"federation_id":"nc","labels":null,"location":null,"project":"1","tags":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null,"version":"3.0.0"},"sensitive_values":{"backend_metastores":[{}],"effective_labels":{},"terraform_labels":{}}}]}},"resource_changes":[{"address":"google_dataproc_metastore_federation.c","mode":"managed","type":"google_dataproc_metastore_federation","name":"c","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"backend_metastores":[{"metastore_type":"DATAPROC_METASTORE","name":"projects/acme-data-01/locations/australia-southeast2/services/test","rank":"5"}],"deletion_protection":false,"effective_labels":{"goog-terraform-provisioned":"true"},"federation_id":"c","labels":null,"location":null,"project":"1","tags":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null,"version":"3.1.2"},"after_unknown":{"backend_metastores":[{}],"create_time":true,"effective_labels":{},"endpoint_uri":true,"id":true,"name":true,"state":true,"state_message":true,"terraform_labels":{},"uid":true,"update_time":true},"before_sensitive":false,"after_sensitive":{"backend_metastores":[{}],"effective_labels":{},"terraform_labels":{}}}},{"address":"google_dataproc_metastore_federation.nc","mode":"managed","type":"google_dataproc_metastore_federation","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"backend_metastores":[{"metastore_type":"METASTORE_TYPE_UNSPECIFIED","name":"projects/acme-data-01/locations/us-central1/services/test","rank":"0"}],"deletion_protection":false,"effective_labels":{"goog-terraform-provisioned":"true"},"federation_id":"nc","labels":null,"location":null,"project":"1","tags":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null,"version":"3.0.0"},"after_unknown":{"backend_metastores":[{}],"create_time":true,"effective_labels":{},"endpoint_uri":true,"id":true,"name":true,"state":true,"state_message":true,"terraform_labels":{},"uid":true,"update_time":true},"before_sensitive":false,"after_sensitive":{"backend_metastores":[{}],"effective_labels":{},"terraform_labels":{}}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_dataproc_metastore_federation.c","mode":"managed","type":"google_dataproc_metastore_federation","name":"c","provider_config_key":"google","expressions":{"backend_metastores":[{"metastore_type":{"constant_value":"DATAPROC_METASTORE"},"name":{"constant_value":"projects/acme-data-01/locations/australia-southeast2/services/test"},"rank":{"constant_value":5}}],"federation_id":{"constant_value":"c"},"project":{"constant_value":1},"version":{"constant_value":"3.1.2"}},"schema_version":0},{"address":"google_dataproc_metastore_federation.nc","mode":"managed","type":"google_dataproc_metastore_federation","name":"nc","provider_config_key":"google","expressions":{"backend_metastores":[{"metastore_type":{"constant_value":"METASTORE_TYPE_UNSPECIFIED"},"name":{"constant_value":"projects/acme-data-01/locations/us-central1/services/test"},"rank":{"constant_value":0}}],"federation_id":{"constant_value":"nc"},"project":{"constant_value":1},"version":{"constant_value":"3.0.0"}},"schema_version":0}]}},"timestamp":"2026-02-05T03:08:44Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/dataproc_metastore/federation/version/c.tf b/inputs/gcp/dataproc_metastore/federation/version/c.tf index 4f15198c1..cd816500b 100644 --- a/inputs/gcp/dataproc_metastore/federation/version/c.tf +++ b/inputs/gcp/dataproc_metastore/federation/version/c.tf @@ -1,6 +1,6 @@ resource "google_dataproc_metastore_federation" "c" { version = "3.1.2" - federation_id = "metastore-fed" + federation_id = "c" project = 1 backend_metastores { diff --git a/inputs/gcp/dataproc_metastore/federation/version/nc.tf b/inputs/gcp/dataproc_metastore/federation/version/nc.tf index 41bbb2df2..441727380 100644 --- a/inputs/gcp/dataproc_metastore/federation/version/nc.tf +++ b/inputs/gcp/dataproc_metastore/federation/version/nc.tf @@ -1,6 +1,6 @@ resource "google_dataproc_metastore_federation" "nc" { version = "3.0.0" - federation_id = "_metastore-fed" + federation_id = "nc" project = 1 backend_metastores { diff --git a/inputs/gcp/dataproc_metastore/federation/version/plan.json b/inputs/gcp/dataproc_metastore/federation/version/plan.json new file mode 100644 index 000000000..96bee268c --- /dev/null +++ b/inputs/gcp/dataproc_metastore/federation/version/plan.json @@ -0,0 +1 @@ +{"format_version":"1.2","terraform_version":"1.13.3","planned_values":{"root_module":{"resources":[{"address":"google_dataproc_metastore_federation.c","mode":"managed","type":"google_dataproc_metastore_federation","name":"c","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"backend_metastores":[{"metastore_type":"DATAPROC_METASTORE","name":"projects/acme-data-01/locations/australia-southeast2/services/hive-prod","rank":"5"}],"deletion_protection":false,"effective_labels":{"goog-terraform-provisioned":"true"},"federation_id":"c","labels":null,"location":null,"project":"1","terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null,"version":"3.1.2"},"sensitive_values":{"backend_metastores":[{}],"effective_labels":{},"terraform_labels":{}}},{"address":"google_dataproc_metastore_federation.nc","mode":"managed","type":"google_dataproc_metastore_federation","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"backend_metastores":[{"metastore_type":"METASTORE_TYPE_UNSPECIFIED","name":"projects/acme-data-01/locations/us-central1/services/hive-test","rank":"0"}],"deletion_protection":false,"effective_labels":{"goog-terraform-provisioned":"true"},"federation_id":"nc","labels":null,"location":null,"project":"1","terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null,"version":"3.0.0"},"sensitive_values":{"backend_metastores":[{}],"effective_labels":{},"terraform_labels":{}}}]}},"resource_changes":[{"address":"google_dataproc_metastore_federation.c","mode":"managed","type":"google_dataproc_metastore_federation","name":"c","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"backend_metastores":[{"metastore_type":"DATAPROC_METASTORE","name":"projects/acme-data-01/locations/australia-southeast2/services/hive-prod","rank":"5"}],"deletion_protection":false,"effective_labels":{"goog-terraform-provisioned":"true"},"federation_id":"c","labels":null,"location":null,"project":"1","terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null,"version":"3.1.2"},"after_unknown":{"backend_metastores":[{}],"create_time":true,"effective_labels":{},"endpoint_uri":true,"id":true,"name":true,"state":true,"state_message":true,"terraform_labels":{},"uid":true,"update_time":true},"before_sensitive":false,"after_sensitive":{"backend_metastores":[{}],"effective_labels":{},"terraform_labels":{}}}},{"address":"google_dataproc_metastore_federation.nc","mode":"managed","type":"google_dataproc_metastore_federation","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"backend_metastores":[{"metastore_type":"METASTORE_TYPE_UNSPECIFIED","name":"projects/acme-data-01/locations/us-central1/services/hive-test","rank":"0"}],"deletion_protection":false,"effective_labels":{"goog-terraform-provisioned":"true"},"federation_id":"nc","labels":null,"location":null,"project":"1","terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null,"version":"3.0.0"},"after_unknown":{"backend_metastores":[{}],"create_time":true,"effective_labels":{},"endpoint_uri":true,"id":true,"name":true,"state":true,"state_message":true,"terraform_labels":{},"uid":true,"update_time":true},"before_sensitive":false,"after_sensitive":{"backend_metastores":[{}],"effective_labels":{},"terraform_labels":{}}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_dataproc_metastore_federation.c","mode":"managed","type":"google_dataproc_metastore_federation","name":"c","provider_config_key":"google","expressions":{"backend_metastores":[{"metastore_type":{"constant_value":"DATAPROC_METASTORE"},"name":{"constant_value":"projects/acme-data-01/locations/australia-southeast2/services/hive-prod"},"rank":{"constant_value":5}}],"federation_id":{"constant_value":"c"},"project":{"constant_value":1},"version":{"constant_value":"3.1.2"}},"schema_version":0},{"address":"google_dataproc_metastore_federation.nc","mode":"managed","type":"google_dataproc_metastore_federation","name":"nc","provider_config_key":"google","expressions":{"backend_metastores":[{"metastore_type":{"constant_value":"METASTORE_TYPE_UNSPECIFIED"},"name":{"constant_value":"projects/acme-data-01/locations/us-central1/services/hive-test"},"rank":{"constant_value":0}}],"federation_id":{"constant_value":"nc"},"project":{"constant_value":1},"version":{"constant_value":"3.0.0"}},"schema_version":0}]}},"timestamp":"2026-02-05T03:08:48Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/dataproc_metastore/service/database_type/c.tf b/inputs/gcp/dataproc_metastore/service/database_type/c.tf index 83ac5cf00..6ebacfe7f 100644 --- a/inputs/gcp/dataproc_metastore/service/database_type/c.tf +++ b/inputs/gcp/dataproc_metastore/service/database_type/c.tf @@ -1,5 +1,5 @@ resource "google_dataproc_metastore_service" "c" { - service_id = "metastore-srv" + service_id = "c" database_type = "MYSQL" project = 1 diff --git a/inputs/gcp/dataproc_metastore/service/database_type/nc.tf b/inputs/gcp/dataproc_metastore/service/database_type/nc.tf index 95d0c0ba5..9c4be0273 100644 --- a/inputs/gcp/dataproc_metastore/service/database_type/nc.tf +++ b/inputs/gcp/dataproc_metastore/service/database_type/nc.tf @@ -1,5 +1,5 @@ resource "google_dataproc_metastore_service" "nc" { - service_id = "_metastore-srv" + service_id = "nc" database_type = "SPANNER" #not a compliant database type project = 1 diff --git a/inputs/gcp/dataproc_metastore/service/database_type/plan.json b/inputs/gcp/dataproc_metastore/service/database_type/plan.json new file mode 100644 index 000000000..4d156ed68 --- /dev/null +++ b/inputs/gcp/dataproc_metastore/service/database_type/plan.json @@ -0,0 +1 @@ +{"format_version":"1.2","terraform_version":"1.13.3","planned_values":{"root_module":{"resources":[{"address":"google_dataproc_metastore_service.c","mode":"managed","type":"google_dataproc_metastore_service","name":"c","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"database_type":"MYSQL","deletion_protection":null,"effective_labels":{"goog-terraform-provisioned":"true"},"encryption_config":[],"hive_metastore_config":[],"labels":null,"location":"global","maintenance_window":[],"metadata_integration":[],"network_config":[],"project":"1","release_channel":"STABLE","scaling_config":[],"scheduled_backup":[],"service_id":"c","terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"sensitive_values":{"effective_labels":{},"encryption_config":[],"hive_metastore_config":[],"maintenance_window":[],"metadata_integration":[],"network_config":[],"scaling_config":[],"scheduled_backup":[],"telemetry_config":[],"terraform_labels":{}}},{"address":"google_dataproc_metastore_service.nc","mode":"managed","type":"google_dataproc_metastore_service","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"database_type":"SPANNER","deletion_protection":null,"effective_labels":{"goog-terraform-provisioned":"true"},"encryption_config":[],"hive_metastore_config":[],"labels":null,"location":"global","maintenance_window":[],"metadata_integration":[],"network_config":[],"project":"1","release_channel":"STABLE","scaling_config":[],"scheduled_backup":[],"service_id":"nc","terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"sensitive_values":{"effective_labels":{},"encryption_config":[],"hive_metastore_config":[],"maintenance_window":[],"metadata_integration":[],"network_config":[],"scaling_config":[],"scheduled_backup":[],"telemetry_config":[],"terraform_labels":{}}}]}},"resource_changes":[{"address":"google_dataproc_metastore_service.c","mode":"managed","type":"google_dataproc_metastore_service","name":"c","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"database_type":"MYSQL","deletion_protection":null,"effective_labels":{"goog-terraform-provisioned":"true"},"encryption_config":[],"hive_metastore_config":[],"labels":null,"location":"global","maintenance_window":[],"metadata_integration":[],"network_config":[],"project":"1","release_channel":"STABLE","scaling_config":[],"scheduled_backup":[],"service_id":"c","terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"after_unknown":{"artifact_gcs_uri":true,"create_time":true,"effective_labels":{},"encryption_config":[],"endpoint_uri":true,"hive_metastore_config":[],"id":true,"maintenance_window":[],"metadata_integration":[],"name":true,"network":true,"network_config":[],"port":true,"scaling_config":[],"scheduled_backup":[],"state":true,"state_message":true,"telemetry_config":true,"terraform_labels":{},"tier":true,"uid":true,"update_time":true},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"encryption_config":[],"hive_metastore_config":[],"maintenance_window":[],"metadata_integration":[],"network_config":[],"scaling_config":[],"scheduled_backup":[],"telemetry_config":[],"terraform_labels":{}}}},{"address":"google_dataproc_metastore_service.nc","mode":"managed","type":"google_dataproc_metastore_service","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"database_type":"SPANNER","deletion_protection":null,"effective_labels":{"goog-terraform-provisioned":"true"},"encryption_config":[],"hive_metastore_config":[],"labels":null,"location":"global","maintenance_window":[],"metadata_integration":[],"network_config":[],"project":"1","release_channel":"STABLE","scaling_config":[],"scheduled_backup":[],"service_id":"nc","terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"after_unknown":{"artifact_gcs_uri":true,"create_time":true,"effective_labels":{},"encryption_config":[],"endpoint_uri":true,"hive_metastore_config":[],"id":true,"maintenance_window":[],"metadata_integration":[],"name":true,"network":true,"network_config":[],"port":true,"scaling_config":[],"scheduled_backup":[],"state":true,"state_message":true,"telemetry_config":true,"terraform_labels":{},"tier":true,"uid":true,"update_time":true},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"encryption_config":[],"hive_metastore_config":[],"maintenance_window":[],"metadata_integration":[],"network_config":[],"scaling_config":[],"scheduled_backup":[],"telemetry_config":[],"terraform_labels":{}}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_dataproc_metastore_service.c","mode":"managed","type":"google_dataproc_metastore_service","name":"c","provider_config_key":"google","expressions":{"database_type":{"constant_value":"MYSQL"},"project":{"constant_value":1},"service_id":{"constant_value":"c"}},"schema_version":0},{"address":"google_dataproc_metastore_service.nc","mode":"managed","type":"google_dataproc_metastore_service","name":"nc","provider_config_key":"google","expressions":{"database_type":{"constant_value":"SPANNER"},"project":{"constant_value":1},"service_id":{"constant_value":"nc"}},"schema_version":0}]}},"timestamp":"2026-02-05T03:08:48Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/dataproc_metastore/service/deletion_protection/c.tf b/inputs/gcp/dataproc_metastore/service/deletion_protection/c.tf index 531b4be64..585eabbd5 100644 --- a/inputs/gcp/dataproc_metastore/service/deletion_protection/c.tf +++ b/inputs/gcp/dataproc_metastore/service/deletion_protection/c.tf @@ -1,5 +1,5 @@ resource "google_dataproc_metastore_service" "c" { - service_id = "metastore-srv" + service_id = "c" deletion_protection = true project = 1 diff --git a/inputs/gcp/dataproc_metastore/service/deletion_protection/nc.tf b/inputs/gcp/dataproc_metastore/service/deletion_protection/nc.tf index a321f58c0..49b25a3a0 100644 --- a/inputs/gcp/dataproc_metastore/service/deletion_protection/nc.tf +++ b/inputs/gcp/dataproc_metastore/service/deletion_protection/nc.tf @@ -1,5 +1,5 @@ resource "google_dataproc_metastore_service" "nc" { - service_id = "_metastore-srv" + service_id = "nc" deletion_protection = false project = 1 diff --git a/inputs/gcp/dataproc_metastore/service/deletion_protection/plan.json b/inputs/gcp/dataproc_metastore/service/deletion_protection/plan.json new file mode 100644 index 000000000..3b9b4afde --- /dev/null +++ b/inputs/gcp/dataproc_metastore/service/deletion_protection/plan.json @@ -0,0 +1 @@ +{"format_version":"1.2","terraform_version":"1.13.3","planned_values":{"root_module":{"resources":[{"address":"google_dataproc_metastore_service.c","mode":"managed","type":"google_dataproc_metastore_service","name":"c","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"database_type":"MYSQL","deletion_protection":true,"effective_labels":{"goog-terraform-provisioned":"true"},"encryption_config":[],"hive_metastore_config":[],"labels":null,"location":"global","maintenance_window":[],"metadata_integration":[],"network_config":[],"project":"1","release_channel":"STABLE","scaling_config":[],"scheduled_backup":[],"service_id":"c","terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"sensitive_values":{"effective_labels":{},"encryption_config":[],"hive_metastore_config":[],"maintenance_window":[],"metadata_integration":[],"network_config":[],"scaling_config":[],"scheduled_backup":[],"telemetry_config":[],"terraform_labels":{}}},{"address":"google_dataproc_metastore_service.nc","mode":"managed","type":"google_dataproc_metastore_service","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"database_type":"MYSQL","deletion_protection":false,"effective_labels":{"goog-terraform-provisioned":"true"},"encryption_config":[],"hive_metastore_config":[],"labels":null,"location":"global","maintenance_window":[],"metadata_integration":[],"network_config":[],"project":"1","release_channel":"STABLE","scaling_config":[],"scheduled_backup":[],"service_id":"nc","terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"sensitive_values":{"effective_labels":{},"encryption_config":[],"hive_metastore_config":[],"maintenance_window":[],"metadata_integration":[],"network_config":[],"scaling_config":[],"scheduled_backup":[],"telemetry_config":[],"terraform_labels":{}}}]}},"resource_changes":[{"address":"google_dataproc_metastore_service.c","mode":"managed","type":"google_dataproc_metastore_service","name":"c","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"database_type":"MYSQL","deletion_protection":true,"effective_labels":{"goog-terraform-provisioned":"true"},"encryption_config":[],"hive_metastore_config":[],"labels":null,"location":"global","maintenance_window":[],"metadata_integration":[],"network_config":[],"project":"1","release_channel":"STABLE","scaling_config":[],"scheduled_backup":[],"service_id":"c","terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"after_unknown":{"artifact_gcs_uri":true,"create_time":true,"effective_labels":{},"encryption_config":[],"endpoint_uri":true,"hive_metastore_config":[],"id":true,"maintenance_window":[],"metadata_integration":[],"name":true,"network":true,"network_config":[],"port":true,"scaling_config":[],"scheduled_backup":[],"state":true,"state_message":true,"telemetry_config":true,"terraform_labels":{},"tier":true,"uid":true,"update_time":true},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"encryption_config":[],"hive_metastore_config":[],"maintenance_window":[],"metadata_integration":[],"network_config":[],"scaling_config":[],"scheduled_backup":[],"telemetry_config":[],"terraform_labels":{}}}},{"address":"google_dataproc_metastore_service.nc","mode":"managed","type":"google_dataproc_metastore_service","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"database_type":"MYSQL","deletion_protection":false,"effective_labels":{"goog-terraform-provisioned":"true"},"encryption_config":[],"hive_metastore_config":[],"labels":null,"location":"global","maintenance_window":[],"metadata_integration":[],"network_config":[],"project":"1","release_channel":"STABLE","scaling_config":[],"scheduled_backup":[],"service_id":"nc","terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"after_unknown":{"artifact_gcs_uri":true,"create_time":true,"effective_labels":{},"encryption_config":[],"endpoint_uri":true,"hive_metastore_config":[],"id":true,"maintenance_window":[],"metadata_integration":[],"name":true,"network":true,"network_config":[],"port":true,"scaling_config":[],"scheduled_backup":[],"state":true,"state_message":true,"telemetry_config":true,"terraform_labels":{},"tier":true,"uid":true,"update_time":true},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"encryption_config":[],"hive_metastore_config":[],"maintenance_window":[],"metadata_integration":[],"network_config":[],"scaling_config":[],"scheduled_backup":[],"telemetry_config":[],"terraform_labels":{}}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_dataproc_metastore_service.c","mode":"managed","type":"google_dataproc_metastore_service","name":"c","provider_config_key":"google","expressions":{"deletion_protection":{"constant_value":true},"project":{"constant_value":1},"service_id":{"constant_value":"c"}},"schema_version":0},{"address":"google_dataproc_metastore_service.nc","mode":"managed","type":"google_dataproc_metastore_service","name":"nc","provider_config_key":"google","expressions":{"deletion_protection":{"constant_value":false},"project":{"constant_value":1},"service_id":{"constant_value":"nc"}},"schema_version":0}]}},"timestamp":"2026-02-05T03:08:48Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/dataproc_metastore/service/encryption_config/.terraform.lock.hcl b/inputs/gcp/dataproc_metastore/service/encryption_config/.terraform.lock.hcl index 6c2d3da9f..316309c9a 100644 --- a/inputs/gcp/dataproc_metastore/service/encryption_config/.terraform.lock.hcl +++ b/inputs/gcp/dataproc_metastore/service/encryption_config/.terraform.lock.hcl @@ -2,20 +2,20 @@ # Manual edits may be lost in future updates. provider "registry.terraform.io/hashicorp/google" { - version = "7.1.1" + version = "7.17.0" hashes = [ - "h1:Hu/Gy8dB7TXsUyswqm6XJhr7esYmXk9Ea/Jo9VgT4LE=", - "zh:03ee9fdc0d157a606aba68658de6dc809fc3335cccb7c537373d8643412c1327", - "zh:110e8ffe81deb8c203ecf310a15c2dedca1dfc936473a247b8a4f98adebd86f5", - "zh:459e3419c004e7a475fb60cc52d47a34b3dc4e4de905eaa8e8f78ddbe550a9b5", - "zh:466cd31cee36877bc18aeabed80d1f4a22bac4e59a460be6e8bdb72dedca0e2b", - "zh:51d707eb2d854fa16dcbe21e29b01534eb893a2152a219ea84a15bbd87a4ff64", - "zh:69d6a1c83ffddd7f81273a98fb0ff7c13985a3c876565dd3df76c730c9929871", - "zh:9b5050da221735c7e8f75ed00d25578afaf8ed94a8c2f1f58f471eee98105d10", - "zh:ab01f2fd961ee86d99a55186093620d29f5323c0cd5613284d484e333679d70b", - "zh:d0f5b15774b15991baf71eb4a55a6831e3fb4b603f589f80b03393b46a9657a4", - "zh:dc198ec4b42435321f4fa12ca8d713cd350ff2f82d8749b87785b91b15b7c3ed", - "zh:e949c00ce89c92b7ed16cc0b0aed8e80d6416b240dc02047f9fa1de49aa4c44e", + "h1:VPHRMsm3eQrxzk1b7eHuSG9sG7315ZaGPshFjqzZ5No=", + "zh:103778d776fb994a6b24d70fa095c23a1672361f2a05d882b227b02507b402fc", + "zh:34bcd6cce3081a21983ccfad5cbf2cbf69ff298c65c6570edb4ec7d38a8183f5", + "zh:5f8fd0e8e40068b597b28c0bc08372c9228aad77746068101c72acf4bb902937", + "zh:6b25cee7dec78470feb987438aedb1f4354c696f6548edee7775621e8df24fa9", + "zh:6b5bd97884b51b86fa6a9f1905c0ebf695539e905122052896e8b05122416ff4", + "zh:86e634c5825d8bd32592ae6b74f15e1db5d9b61c85d1a2e529d1696effb76d54", + "zh:c3190609f6f638f4efd7359a5638eeff81d41a38a00861f7df870b5c8f4c11cb", + "zh:d42d854642b4d3b010f232d848197945f90af60e7f9883ac96d7caae9c9d2474", + "zh:da9929be5d3873ad317e488e7ada08d5b95b5461b34d91cef76314317bdc0d49", + "zh:ed2763c21b2f3c1eb7b4b92f6502069a24078345e19c88f91d9e3a46a17147f8", "zh:f569b65999264a9416862bca5cd2a6177d94ccb0424f3a4ef424428912b9cb3c", + "zh:fbca63b82bbdef6fd329d2c8356b3f39f8c785ad93fd0596cfff676dbaef23ac", ] } diff --git a/inputs/gcp/dataproc_metastore/service/encryption_config/c.tf b/inputs/gcp/dataproc_metastore/service/encryption_config/c.tf index f0fcb7d41..bac5f9cc3 100644 --- a/inputs/gcp/dataproc_metastore/service/encryption_config/c.tf +++ b/inputs/gcp/dataproc_metastore/service/encryption_config/c.tf @@ -1,5 +1,5 @@ resource "google_dataproc_metastore_service" "c" { - service_id = "metastore-srv" + service_id = "c" project = 1 encryption_config { diff --git a/inputs/gcp/dataproc_metastore/service/encryption_config/nc.tf b/inputs/gcp/dataproc_metastore/service/encryption_config/nc.tf index 83645e53a..5967ae14d 100644 --- a/inputs/gcp/dataproc_metastore/service/encryption_config/nc.tf +++ b/inputs/gcp/dataproc_metastore/service/encryption_config/nc.tf @@ -1,5 +1,5 @@ resource "google_dataproc_metastore_service" "nc" { - service_id = "_metastore-srv" + service_id = "nc" project = 1 encryption_config { diff --git a/inputs/gcp/dataproc_metastore/service/encryption_config/plan.json b/inputs/gcp/dataproc_metastore/service/encryption_config/plan.json new file mode 100644 index 000000000..f822686c4 --- /dev/null +++ b/inputs/gcp/dataproc_metastore/service/encryption_config/plan.json @@ -0,0 +1 @@ +{"format_version":"1.2","terraform_version":"1.13.3","planned_values":{"root_module":{"resources":[{"address":"google_dataproc_metastore_service.c","mode":"managed","type":"google_dataproc_metastore_service","name":"c","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"database_type":"MYSQL","deletion_protection":null,"effective_labels":{"goog-terraform-provisioned":"true"},"encryption_config":[{"kms_key":"projects-example/australia-southeast2/dpm-ring/metastore-cmek/"}],"hive_metastore_config":[],"labels":null,"location":"global","maintenance_window":[],"metadata_integration":[],"network_config":[],"project":"1","release_channel":"STABLE","scaling_config":[],"scheduled_backup":[],"service_id":"c","tags":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"sensitive_values":{"effective_labels":{},"encryption_config":[{}],"hive_metastore_config":[],"maintenance_window":[],"metadata_integration":[],"network_config":[],"scaling_config":[],"scheduled_backup":[],"telemetry_config":[],"terraform_labels":{}}},{"address":"google_dataproc_metastore_service.nc","mode":"managed","type":"google_dataproc_metastore_service","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"database_type":"MYSQL","deletion_protection":null,"effective_labels":{"goog-terraform-provisioned":"true"},"encryption_config":[{"kms_key":"projects-example/usa/dpm-ring/metastore-cmek/"}],"hive_metastore_config":[],"labels":null,"location":"global","maintenance_window":[],"metadata_integration":[],"network_config":[],"project":"1","release_channel":"STABLE","scaling_config":[],"scheduled_backup":[],"service_id":"nc","tags":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"sensitive_values":{"effective_labels":{},"encryption_config":[{}],"hive_metastore_config":[],"maintenance_window":[],"metadata_integration":[],"network_config":[],"scaling_config":[],"scheduled_backup":[],"telemetry_config":[],"terraform_labels":{}}}]}},"resource_changes":[{"address":"google_dataproc_metastore_service.c","mode":"managed","type":"google_dataproc_metastore_service","name":"c","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"database_type":"MYSQL","deletion_protection":null,"effective_labels":{"goog-terraform-provisioned":"true"},"encryption_config":[{"kms_key":"projects-example/australia-southeast2/dpm-ring/metastore-cmek/"}],"hive_metastore_config":[],"labels":null,"location":"global","maintenance_window":[],"metadata_integration":[],"network_config":[],"project":"1","release_channel":"STABLE","scaling_config":[],"scheduled_backup":[],"service_id":"c","tags":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"after_unknown":{"artifact_gcs_uri":true,"create_time":true,"effective_labels":{},"encryption_config":[{}],"endpoint_uri":true,"hive_metastore_config":[],"id":true,"maintenance_window":[],"metadata_integration":[],"name":true,"network":true,"network_config":[],"port":true,"scaling_config":[],"scheduled_backup":[],"state":true,"state_message":true,"telemetry_config":true,"terraform_labels":{},"tier":true,"uid":true,"update_time":true},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"encryption_config":[{}],"hive_metastore_config":[],"maintenance_window":[],"metadata_integration":[],"network_config":[],"scaling_config":[],"scheduled_backup":[],"telemetry_config":[],"terraform_labels":{}}}},{"address":"google_dataproc_metastore_service.nc","mode":"managed","type":"google_dataproc_metastore_service","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"database_type":"MYSQL","deletion_protection":null,"effective_labels":{"goog-terraform-provisioned":"true"},"encryption_config":[{"kms_key":"projects-example/usa/dpm-ring/metastore-cmek/"}],"hive_metastore_config":[],"labels":null,"location":"global","maintenance_window":[],"metadata_integration":[],"network_config":[],"project":"1","release_channel":"STABLE","scaling_config":[],"scheduled_backup":[],"service_id":"nc","tags":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"after_unknown":{"artifact_gcs_uri":true,"create_time":true,"effective_labels":{},"encryption_config":[{}],"endpoint_uri":true,"hive_metastore_config":[],"id":true,"maintenance_window":[],"metadata_integration":[],"name":true,"network":true,"network_config":[],"port":true,"scaling_config":[],"scheduled_backup":[],"state":true,"state_message":true,"telemetry_config":true,"terraform_labels":{},"tier":true,"uid":true,"update_time":true},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"encryption_config":[{}],"hive_metastore_config":[],"maintenance_window":[],"metadata_integration":[],"network_config":[],"scaling_config":[],"scheduled_backup":[],"telemetry_config":[],"terraform_labels":{}}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_dataproc_metastore_service.c","mode":"managed","type":"google_dataproc_metastore_service","name":"c","provider_config_key":"google","expressions":{"encryption_config":[{"kms_key":{"constant_value":"projects-example/australia-southeast2/dpm-ring/metastore-cmek/"}}],"project":{"constant_value":1},"service_id":{"constant_value":"c"}},"schema_version":0},{"address":"google_dataproc_metastore_service.nc","mode":"managed","type":"google_dataproc_metastore_service","name":"nc","provider_config_key":"google","expressions":{"encryption_config":[{"kms_key":{"constant_value":"projects-example/usa/dpm-ring/metastore-cmek/"}}],"project":{"constant_value":1},"service_id":{"constant_value":"nc"}},"schema_version":0}]}},"timestamp":"2026-02-05T03:08:48Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/dataproc_metastore/service/location/c.tf b/inputs/gcp/dataproc_metastore/service/location/c.tf index 1968b023c..a25c8f433 100644 --- a/inputs/gcp/dataproc_metastore/service/location/c.tf +++ b/inputs/gcp/dataproc_metastore/service/location/c.tf @@ -1,5 +1,5 @@ resource "google_dataproc_metastore_service" "c" { - service_id = "metastore-srv" + service_id = "c" location = "australia-southeast2" project = 1 diff --git a/inputs/gcp/dataproc_metastore/service/location/nc.tf b/inputs/gcp/dataproc_metastore/service/location/nc.tf index ca5de45ed..5da42858f 100644 --- a/inputs/gcp/dataproc_metastore/service/location/nc.tf +++ b/inputs/gcp/dataproc_metastore/service/location/nc.tf @@ -1,5 +1,5 @@ resource "google_dataproc_metastore_service" "nc" { - service_id = "metastore-srv" + service_id = "nc" location = "Global" project = 1 diff --git a/inputs/gcp/dataproc_metastore/service/location/plan.json b/inputs/gcp/dataproc_metastore/service/location/plan.json new file mode 100644 index 000000000..5ac095159 --- /dev/null +++ b/inputs/gcp/dataproc_metastore/service/location/plan.json @@ -0,0 +1 @@ +{"format_version":"1.2","terraform_version":"1.13.3","planned_values":{"root_module":{"resources":[{"address":"google_dataproc_metastore_service.c","mode":"managed","type":"google_dataproc_metastore_service","name":"c","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"database_type":"MYSQL","deletion_protection":null,"effective_labels":{"goog-terraform-provisioned":"true"},"encryption_config":[],"hive_metastore_config":[],"labels":null,"location":"australia-southeast2","maintenance_window":[],"metadata_integration":[],"network_config":[],"project":"1","release_channel":"STABLE","scaling_config":[],"scheduled_backup":[],"service_id":"c","terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"sensitive_values":{"effective_labels":{},"encryption_config":[],"hive_metastore_config":[],"maintenance_window":[],"metadata_integration":[],"network_config":[],"scaling_config":[],"scheduled_backup":[],"telemetry_config":[],"terraform_labels":{}}},{"address":"google_dataproc_metastore_service.nc","mode":"managed","type":"google_dataproc_metastore_service","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"database_type":"MYSQL","deletion_protection":null,"effective_labels":{"goog-terraform-provisioned":"true"},"encryption_config":[],"hive_metastore_config":[],"labels":null,"location":"Global","maintenance_window":[],"metadata_integration":[],"network_config":[],"project":"1","release_channel":"STABLE","scaling_config":[],"scheduled_backup":[],"service_id":"nc","terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"sensitive_values":{"effective_labels":{},"encryption_config":[],"hive_metastore_config":[],"maintenance_window":[],"metadata_integration":[],"network_config":[],"scaling_config":[],"scheduled_backup":[],"telemetry_config":[],"terraform_labels":{}}}]}},"resource_changes":[{"address":"google_dataproc_metastore_service.c","mode":"managed","type":"google_dataproc_metastore_service","name":"c","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"database_type":"MYSQL","deletion_protection":null,"effective_labels":{"goog-terraform-provisioned":"true"},"encryption_config":[],"hive_metastore_config":[],"labels":null,"location":"australia-southeast2","maintenance_window":[],"metadata_integration":[],"network_config":[],"project":"1","release_channel":"STABLE","scaling_config":[],"scheduled_backup":[],"service_id":"c","terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"after_unknown":{"artifact_gcs_uri":true,"create_time":true,"effective_labels":{},"encryption_config":[],"endpoint_uri":true,"hive_metastore_config":[],"id":true,"maintenance_window":[],"metadata_integration":[],"name":true,"network":true,"network_config":[],"port":true,"scaling_config":[],"scheduled_backup":[],"state":true,"state_message":true,"telemetry_config":true,"terraform_labels":{},"tier":true,"uid":true,"update_time":true},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"encryption_config":[],"hive_metastore_config":[],"maintenance_window":[],"metadata_integration":[],"network_config":[],"scaling_config":[],"scheduled_backup":[],"telemetry_config":[],"terraform_labels":{}}}},{"address":"google_dataproc_metastore_service.nc","mode":"managed","type":"google_dataproc_metastore_service","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"database_type":"MYSQL","deletion_protection":null,"effective_labels":{"goog-terraform-provisioned":"true"},"encryption_config":[],"hive_metastore_config":[],"labels":null,"location":"Global","maintenance_window":[],"metadata_integration":[],"network_config":[],"project":"1","release_channel":"STABLE","scaling_config":[],"scheduled_backup":[],"service_id":"nc","terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"after_unknown":{"artifact_gcs_uri":true,"create_time":true,"effective_labels":{},"encryption_config":[],"endpoint_uri":true,"hive_metastore_config":[],"id":true,"maintenance_window":[],"metadata_integration":[],"name":true,"network":true,"network_config":[],"port":true,"scaling_config":[],"scheduled_backup":[],"state":true,"state_message":true,"telemetry_config":true,"terraform_labels":{},"tier":true,"uid":true,"update_time":true},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"encryption_config":[],"hive_metastore_config":[],"maintenance_window":[],"metadata_integration":[],"network_config":[],"scaling_config":[],"scheduled_backup":[],"telemetry_config":[],"terraform_labels":{}}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_dataproc_metastore_service.c","mode":"managed","type":"google_dataproc_metastore_service","name":"c","provider_config_key":"google","expressions":{"location":{"constant_value":"australia-southeast2"},"project":{"constant_value":1},"service_id":{"constant_value":"c"}},"schema_version":0},{"address":"google_dataproc_metastore_service.nc","mode":"managed","type":"google_dataproc_metastore_service","name":"nc","provider_config_key":"google","expressions":{"location":{"constant_value":"Global"},"project":{"constant_value":1},"service_id":{"constant_value":"nc"}},"schema_version":0}]}},"timestamp":"2026-02-05T03:08:53Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/dataproc_metastore/service/metadata_integration/.terraform.lock.hcl b/inputs/gcp/dataproc_metastore/service/metadata_integration/.terraform.lock.hcl index 6c2d3da9f..316309c9a 100644 --- a/inputs/gcp/dataproc_metastore/service/metadata_integration/.terraform.lock.hcl +++ b/inputs/gcp/dataproc_metastore/service/metadata_integration/.terraform.lock.hcl @@ -2,20 +2,20 @@ # Manual edits may be lost in future updates. provider "registry.terraform.io/hashicorp/google" { - version = "7.1.1" + version = "7.17.0" hashes = [ - "h1:Hu/Gy8dB7TXsUyswqm6XJhr7esYmXk9Ea/Jo9VgT4LE=", - "zh:03ee9fdc0d157a606aba68658de6dc809fc3335cccb7c537373d8643412c1327", - "zh:110e8ffe81deb8c203ecf310a15c2dedca1dfc936473a247b8a4f98adebd86f5", - "zh:459e3419c004e7a475fb60cc52d47a34b3dc4e4de905eaa8e8f78ddbe550a9b5", - "zh:466cd31cee36877bc18aeabed80d1f4a22bac4e59a460be6e8bdb72dedca0e2b", - "zh:51d707eb2d854fa16dcbe21e29b01534eb893a2152a219ea84a15bbd87a4ff64", - "zh:69d6a1c83ffddd7f81273a98fb0ff7c13985a3c876565dd3df76c730c9929871", - "zh:9b5050da221735c7e8f75ed00d25578afaf8ed94a8c2f1f58f471eee98105d10", - "zh:ab01f2fd961ee86d99a55186093620d29f5323c0cd5613284d484e333679d70b", - "zh:d0f5b15774b15991baf71eb4a55a6831e3fb4b603f589f80b03393b46a9657a4", - "zh:dc198ec4b42435321f4fa12ca8d713cd350ff2f82d8749b87785b91b15b7c3ed", - "zh:e949c00ce89c92b7ed16cc0b0aed8e80d6416b240dc02047f9fa1de49aa4c44e", + "h1:VPHRMsm3eQrxzk1b7eHuSG9sG7315ZaGPshFjqzZ5No=", + "zh:103778d776fb994a6b24d70fa095c23a1672361f2a05d882b227b02507b402fc", + "zh:34bcd6cce3081a21983ccfad5cbf2cbf69ff298c65c6570edb4ec7d38a8183f5", + "zh:5f8fd0e8e40068b597b28c0bc08372c9228aad77746068101c72acf4bb902937", + "zh:6b25cee7dec78470feb987438aedb1f4354c696f6548edee7775621e8df24fa9", + "zh:6b5bd97884b51b86fa6a9f1905c0ebf695539e905122052896e8b05122416ff4", + "zh:86e634c5825d8bd32592ae6b74f15e1db5d9b61c85d1a2e529d1696effb76d54", + "zh:c3190609f6f638f4efd7359a5638eeff81d41a38a00861f7df870b5c8f4c11cb", + "zh:d42d854642b4d3b010f232d848197945f90af60e7f9883ac96d7caae9c9d2474", + "zh:da9929be5d3873ad317e488e7ada08d5b95b5461b34d91cef76314317bdc0d49", + "zh:ed2763c21b2f3c1eb7b4b92f6502069a24078345e19c88f91d9e3a46a17147f8", "zh:f569b65999264a9416862bca5cd2a6177d94ccb0424f3a4ef424428912b9cb3c", + "zh:fbca63b82bbdef6fd329d2c8356b3f39f8c785ad93fd0596cfff676dbaef23ac", ] } diff --git a/inputs/gcp/dataproc_metastore/service/metadata_integration/c.tf b/inputs/gcp/dataproc_metastore/service/metadata_integration/c.tf index 59525ec4c..d720d0902 100644 --- a/inputs/gcp/dataproc_metastore/service/metadata_integration/c.tf +++ b/inputs/gcp/dataproc_metastore/service/metadata_integration/c.tf @@ -1,5 +1,5 @@ resource "google_dataproc_metastore_service" "c" { - service_id = "metastore-srv" + service_id = "c" project = 1 metadata_integration { diff --git a/inputs/gcp/dataproc_metastore/service/metadata_integration/nc.tf b/inputs/gcp/dataproc_metastore/service/metadata_integration/nc.tf index 950c64e07..72e0d5fdb 100644 --- a/inputs/gcp/dataproc_metastore/service/metadata_integration/nc.tf +++ b/inputs/gcp/dataproc_metastore/service/metadata_integration/nc.tf @@ -1,5 +1,5 @@ resource "google_dataproc_metastore_service" "nc" { - service_id = "metastore-srv" + service_id = "nc" project = 1 metadata_integration { diff --git a/inputs/gcp/dataproc_metastore/service/metadata_integration/plan.json b/inputs/gcp/dataproc_metastore/service/metadata_integration/plan.json new file mode 100644 index 000000000..eebf1ff52 --- /dev/null +++ b/inputs/gcp/dataproc_metastore/service/metadata_integration/plan.json @@ -0,0 +1 @@ +{"format_version":"1.2","terraform_version":"1.13.3","planned_values":{"root_module":{"resources":[{"address":"google_dataproc_metastore_service.c","mode":"managed","type":"google_dataproc_metastore_service","name":"c","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"database_type":"MYSQL","deletion_protection":null,"effective_labels":{"goog-terraform-provisioned":"true"},"encryption_config":[],"hive_metastore_config":[],"labels":null,"location":"global","maintenance_window":[],"metadata_integration":[{"data_catalog_config":[{"enabled":true}]}],"network_config":[],"project":"1","release_channel":"STABLE","scaling_config":[],"scheduled_backup":[],"service_id":"c","tags":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"sensitive_values":{"effective_labels":{},"encryption_config":[],"hive_metastore_config":[],"maintenance_window":[],"metadata_integration":[{"data_catalog_config":[{}]}],"network_config":[],"scaling_config":[],"scheduled_backup":[],"telemetry_config":[],"terraform_labels":{}}},{"address":"google_dataproc_metastore_service.nc","mode":"managed","type":"google_dataproc_metastore_service","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"database_type":"MYSQL","deletion_protection":null,"effective_labels":{"goog-terraform-provisioned":"true"},"encryption_config":[],"hive_metastore_config":[],"labels":null,"location":"global","maintenance_window":[],"metadata_integration":[{"data_catalog_config":[{"enabled":false}]}],"network_config":[],"project":"1","release_channel":"STABLE","scaling_config":[],"scheduled_backup":[],"service_id":"nc","tags":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"sensitive_values":{"effective_labels":{},"encryption_config":[],"hive_metastore_config":[],"maintenance_window":[],"metadata_integration":[{"data_catalog_config":[{}]}],"network_config":[],"scaling_config":[],"scheduled_backup":[],"telemetry_config":[],"terraform_labels":{}}}]}},"resource_changes":[{"address":"google_dataproc_metastore_service.c","mode":"managed","type":"google_dataproc_metastore_service","name":"c","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"database_type":"MYSQL","deletion_protection":null,"effective_labels":{"goog-terraform-provisioned":"true"},"encryption_config":[],"hive_metastore_config":[],"labels":null,"location":"global","maintenance_window":[],"metadata_integration":[{"data_catalog_config":[{"enabled":true}]}],"network_config":[],"project":"1","release_channel":"STABLE","scaling_config":[],"scheduled_backup":[],"service_id":"c","tags":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"after_unknown":{"artifact_gcs_uri":true,"create_time":true,"effective_labels":{},"encryption_config":[],"endpoint_uri":true,"hive_metastore_config":[],"id":true,"maintenance_window":[],"metadata_integration":[{"data_catalog_config":[{}]}],"name":true,"network":true,"network_config":[],"port":true,"scaling_config":[],"scheduled_backup":[],"state":true,"state_message":true,"telemetry_config":true,"terraform_labels":{},"tier":true,"uid":true,"update_time":true},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"encryption_config":[],"hive_metastore_config":[],"maintenance_window":[],"metadata_integration":[{"data_catalog_config":[{}]}],"network_config":[],"scaling_config":[],"scheduled_backup":[],"telemetry_config":[],"terraform_labels":{}}}},{"address":"google_dataproc_metastore_service.nc","mode":"managed","type":"google_dataproc_metastore_service","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"database_type":"MYSQL","deletion_protection":null,"effective_labels":{"goog-terraform-provisioned":"true"},"encryption_config":[],"hive_metastore_config":[],"labels":null,"location":"global","maintenance_window":[],"metadata_integration":[{"data_catalog_config":[{"enabled":false}]}],"network_config":[],"project":"1","release_channel":"STABLE","scaling_config":[],"scheduled_backup":[],"service_id":"nc","tags":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"after_unknown":{"artifact_gcs_uri":true,"create_time":true,"effective_labels":{},"encryption_config":[],"endpoint_uri":true,"hive_metastore_config":[],"id":true,"maintenance_window":[],"metadata_integration":[{"data_catalog_config":[{}]}],"name":true,"network":true,"network_config":[],"port":true,"scaling_config":[],"scheduled_backup":[],"state":true,"state_message":true,"telemetry_config":true,"terraform_labels":{},"tier":true,"uid":true,"update_time":true},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"encryption_config":[],"hive_metastore_config":[],"maintenance_window":[],"metadata_integration":[{"data_catalog_config":[{}]}],"network_config":[],"scaling_config":[],"scheduled_backup":[],"telemetry_config":[],"terraform_labels":{}}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_dataproc_metastore_service.c","mode":"managed","type":"google_dataproc_metastore_service","name":"c","provider_config_key":"google","expressions":{"metadata_integration":[{"data_catalog_config":[{"enabled":{"constant_value":true}}]}],"project":{"constant_value":1},"service_id":{"constant_value":"c"}},"schema_version":0},{"address":"google_dataproc_metastore_service.nc","mode":"managed","type":"google_dataproc_metastore_service","name":"nc","provider_config_key":"google","expressions":{"metadata_integration":[{"data_catalog_config":[{"enabled":{"constant_value":false}}]}],"project":{"constant_value":1},"service_id":{"constant_value":"nc"}},"schema_version":0}]}},"timestamp":"2026-02-05T03:08:53Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/dataproc_metastore/service/port/c.tf b/inputs/gcp/dataproc_metastore/service/port/c.tf index 0fbbae059..9d8dc9d9c 100644 --- a/inputs/gcp/dataproc_metastore/service/port/c.tf +++ b/inputs/gcp/dataproc_metastore/service/port/c.tf @@ -1,8 +1,19 @@ resource "google_dataproc_metastore_service" "c" { - service_id = "metastore-srv" - port = 9083 - project = 1 + service_id = "c" + port = 9083 + tier = "DEVELOPER" + project = "1" + maintenance_window { + hour_of_day = 2 + day_of_week = "SUNDAY" + } - -} + hive_metastore_config { + version = "2.3.6" + } + + labels = { + env = "test" + } +} \ No newline at end of file diff --git a/inputs/gcp/dataproc_metastore/service/port/nc.tf b/inputs/gcp/dataproc_metastore/service/port/nc.tf index 5db1482cf..6f62e9cac 100644 --- a/inputs/gcp/dataproc_metastore/service/port/nc.tf +++ b/inputs/gcp/dataproc_metastore/service/port/nc.tf @@ -1,7 +1,19 @@ resource "google_dataproc_metastore_service" "nc" { - service_id = "_metastore-srv" - port = 9084 - project = 1 + service_id = "nc" + port = 8080 + tier = "DEVELOPER" + project = "1" - -} + maintenance_window { + hour_of_day = 2 + day_of_week = "SUNDAY" + } + + hive_metastore_config { + version = "2.3.6" + } + + labels = { + env = "test" + } +} \ No newline at end of file diff --git a/inputs/gcp/dataproc_metastore/service/port/plan.json b/inputs/gcp/dataproc_metastore/service/port/plan.json new file mode 100644 index 000000000..057208ef2 --- /dev/null +++ b/inputs/gcp/dataproc_metastore/service/port/plan.json @@ -0,0 +1 @@ +{"format_version":"1.2","terraform_version":"1.13.3","planned_values":{"root_module":{"resources":[{"address":"google_dataproc_metastore_service.c","mode":"managed","type":"google_dataproc_metastore_service","name":"c","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"database_type":"MYSQL","deletion_protection":null,"effective_labels":{"env":"test","goog-terraform-provisioned":"true"},"encryption_config":[],"hive_metastore_config":[{"auxiliary_versions":[],"endpoint_protocol":"THRIFT","kerberos_config":[],"version":"2.3.6"}],"labels":{"env":"test"},"location":"global","maintenance_window":[{"day_of_week":"SUNDAY","hour_of_day":2}],"metadata_integration":[],"network_config":[],"port":9083,"project":"1","release_channel":"STABLE","scaling_config":[],"scheduled_backup":[],"service_id":"c","terraform_labels":{"env":"test","goog-terraform-provisioned":"true"},"tier":"DEVELOPER","timeouts":null},"sensitive_values":{"effective_labels":{},"encryption_config":[],"hive_metastore_config":[{"auxiliary_versions":[],"config_overrides":{},"kerberos_config":[]}],"labels":{},"maintenance_window":[{}],"metadata_integration":[],"network_config":[],"scaling_config":[],"scheduled_backup":[],"telemetry_config":[],"terraform_labels":{}}},{"address":"google_dataproc_metastore_service.nc","mode":"managed","type":"google_dataproc_metastore_service","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"database_type":"MYSQL","deletion_protection":null,"effective_labels":{"env":"test","goog-terraform-provisioned":"true"},"encryption_config":[],"hive_metastore_config":[{"auxiliary_versions":[],"endpoint_protocol":"THRIFT","kerberos_config":[],"version":"2.3.6"}],"labels":{"env":"test"},"location":"global","maintenance_window":[{"day_of_week":"SUNDAY","hour_of_day":2}],"metadata_integration":[],"network_config":[],"port":8080,"project":"1","release_channel":"STABLE","scaling_config":[],"scheduled_backup":[],"service_id":"nc","terraform_labels":{"env":"test","goog-terraform-provisioned":"true"},"tier":"DEVELOPER","timeouts":null},"sensitive_values":{"effective_labels":{},"encryption_config":[],"hive_metastore_config":[{"auxiliary_versions":[],"config_overrides":{},"kerberos_config":[]}],"labels":{},"maintenance_window":[{}],"metadata_integration":[],"network_config":[],"scaling_config":[],"scheduled_backup":[],"telemetry_config":[],"terraform_labels":{}}}]}},"resource_changes":[{"address":"google_dataproc_metastore_service.c","mode":"managed","type":"google_dataproc_metastore_service","name":"c","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"database_type":"MYSQL","deletion_protection":null,"effective_labels":{"env":"test","goog-terraform-provisioned":"true"},"encryption_config":[],"hive_metastore_config":[{"auxiliary_versions":[],"endpoint_protocol":"THRIFT","kerberos_config":[],"version":"2.3.6"}],"labels":{"env":"test"},"location":"global","maintenance_window":[{"day_of_week":"SUNDAY","hour_of_day":2}],"metadata_integration":[],"network_config":[],"port":9083,"project":"1","release_channel":"STABLE","scaling_config":[],"scheduled_backup":[],"service_id":"c","terraform_labels":{"env":"test","goog-terraform-provisioned":"true"},"tier":"DEVELOPER","timeouts":null},"after_unknown":{"artifact_gcs_uri":true,"create_time":true,"effective_labels":{},"encryption_config":[],"endpoint_uri":true,"hive_metastore_config":[{"auxiliary_versions":[],"config_overrides":true,"kerberos_config":[]}],"id":true,"labels":{},"maintenance_window":[{}],"metadata_integration":[],"name":true,"network":true,"network_config":[],"scaling_config":[],"scheduled_backup":[],"state":true,"state_message":true,"telemetry_config":true,"terraform_labels":{},"uid":true,"update_time":true},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"encryption_config":[],"hive_metastore_config":[{"auxiliary_versions":[],"config_overrides":{},"kerberos_config":[]}],"labels":{},"maintenance_window":[{}],"metadata_integration":[],"network_config":[],"scaling_config":[],"scheduled_backup":[],"telemetry_config":[],"terraform_labels":{}}}},{"address":"google_dataproc_metastore_service.nc","mode":"managed","type":"google_dataproc_metastore_service","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"database_type":"MYSQL","deletion_protection":null,"effective_labels":{"env":"test","goog-terraform-provisioned":"true"},"encryption_config":[],"hive_metastore_config":[{"auxiliary_versions":[],"endpoint_protocol":"THRIFT","kerberos_config":[],"version":"2.3.6"}],"labels":{"env":"test"},"location":"global","maintenance_window":[{"day_of_week":"SUNDAY","hour_of_day":2}],"metadata_integration":[],"network_config":[],"port":8080,"project":"1","release_channel":"STABLE","scaling_config":[],"scheduled_backup":[],"service_id":"nc","terraform_labels":{"env":"test","goog-terraform-provisioned":"true"},"tier":"DEVELOPER","timeouts":null},"after_unknown":{"artifact_gcs_uri":true,"create_time":true,"effective_labels":{},"encryption_config":[],"endpoint_uri":true,"hive_metastore_config":[{"auxiliary_versions":[],"config_overrides":true,"kerberos_config":[]}],"id":true,"labels":{},"maintenance_window":[{}],"metadata_integration":[],"name":true,"network":true,"network_config":[],"scaling_config":[],"scheduled_backup":[],"state":true,"state_message":true,"telemetry_config":true,"terraform_labels":{},"uid":true,"update_time":true},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"encryption_config":[],"hive_metastore_config":[{"auxiliary_versions":[],"config_overrides":{},"kerberos_config":[]}],"labels":{},"maintenance_window":[{}],"metadata_integration":[],"network_config":[],"scaling_config":[],"scheduled_backup":[],"telemetry_config":[],"terraform_labels":{}}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_dataproc_metastore_service.c","mode":"managed","type":"google_dataproc_metastore_service","name":"c","provider_config_key":"google","expressions":{"hive_metastore_config":[{"version":{"constant_value":"2.3.6"}}],"labels":{"constant_value":{"env":"test"}},"maintenance_window":[{"day_of_week":{"constant_value":"SUNDAY"},"hour_of_day":{"constant_value":2}}],"port":{"constant_value":9083},"project":{"constant_value":"1"},"service_id":{"constant_value":"c"},"tier":{"constant_value":"DEVELOPER"}},"schema_version":0},{"address":"google_dataproc_metastore_service.nc","mode":"managed","type":"google_dataproc_metastore_service","name":"nc","provider_config_key":"google","expressions":{"hive_metastore_config":[{"version":{"constant_value":"2.3.6"}}],"labels":{"constant_value":{"env":"test"}},"maintenance_window":[{"day_of_week":{"constant_value":"SUNDAY"},"hour_of_day":{"constant_value":2}}],"port":{"constant_value":8080},"project":{"constant_value":"1"},"service_id":{"constant_value":"nc"},"tier":{"constant_value":"DEVELOPER"}},"schema_version":0}]}},"timestamp":"2026-02-05T03:08:53Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/dataproc_metastore/service/scheduled_backup/c.tf b/inputs/gcp/dataproc_metastore/service/scheduled_backup/c.tf index 61e3a0036..41fb3fb02 100644 --- a/inputs/gcp/dataproc_metastore/service/scheduled_backup/c.tf +++ b/inputs/gcp/dataproc_metastore/service/scheduled_backup/c.tf @@ -1,5 +1,5 @@ resource "google_dataproc_metastore_service" "c" { - service_id = "metastore-srv" + service_id = "c" project = 1 scheduled_backup { diff --git a/inputs/gcp/dataproc_metastore/service/scheduled_backup/nc.tf b/inputs/gcp/dataproc_metastore/service/scheduled_backup/nc.tf index 5cb97d706..c45dfd5fe 100644 --- a/inputs/gcp/dataproc_metastore/service/scheduled_backup/nc.tf +++ b/inputs/gcp/dataproc_metastore/service/scheduled_backup/nc.tf @@ -1,5 +1,5 @@ resource "google_dataproc_metastore_service" "nc" { - service_id = "_metastore-srv" + service_id = "nc" project = 1 scheduled_backup { diff --git a/inputs/gcp/dataproc_metastore/service/scheduled_backup/plan.json b/inputs/gcp/dataproc_metastore/service/scheduled_backup/plan.json new file mode 100644 index 000000000..0ede56a05 --- /dev/null +++ b/inputs/gcp/dataproc_metastore/service/scheduled_backup/plan.json @@ -0,0 +1 @@ +{"format_version":"1.2","terraform_version":"1.13.3","planned_values":{"root_module":{"resources":[{"address":"google_dataproc_metastore_service.c","mode":"managed","type":"google_dataproc_metastore_service","name":"c","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"database_type":"MYSQL","deletion_protection":null,"effective_labels":{"goog-terraform-provisioned":"true"},"encryption_config":[],"hive_metastore_config":[],"labels":null,"location":"global","maintenance_window":[],"metadata_integration":[],"network_config":[],"project":"1","release_channel":"STABLE","scaling_config":[],"scheduled_backup":[{"backup_location":"gs://BUCKET_NAME/FOLDER_NAME/","cron_schedule":null,"enabled":true}],"service_id":"c","terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"sensitive_values":{"effective_labels":{},"encryption_config":[],"hive_metastore_config":[],"maintenance_window":[],"metadata_integration":[],"network_config":[],"scaling_config":[],"scheduled_backup":[{}],"telemetry_config":[],"terraform_labels":{}}},{"address":"google_dataproc_metastore_service.nc","mode":"managed","type":"google_dataproc_metastore_service","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"database_type":"MYSQL","deletion_protection":null,"effective_labels":{"goog-terraform-provisioned":"true"},"encryption_config":[],"hive_metastore_config":[],"labels":null,"location":"global","maintenance_window":[],"metadata_integration":[],"network_config":[],"project":"1","release_channel":"STABLE","scaling_config":[],"scheduled_backup":[{"backup_location":"invalid-location","cron_schedule":null,"enabled":false}],"service_id":"nc","terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"sensitive_values":{"effective_labels":{},"encryption_config":[],"hive_metastore_config":[],"maintenance_window":[],"metadata_integration":[],"network_config":[],"scaling_config":[],"scheduled_backup":[{}],"telemetry_config":[],"terraform_labels":{}}}]}},"resource_changes":[{"address":"google_dataproc_metastore_service.c","mode":"managed","type":"google_dataproc_metastore_service","name":"c","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"database_type":"MYSQL","deletion_protection":null,"effective_labels":{"goog-terraform-provisioned":"true"},"encryption_config":[],"hive_metastore_config":[],"labels":null,"location":"global","maintenance_window":[],"metadata_integration":[],"network_config":[],"project":"1","release_channel":"STABLE","scaling_config":[],"scheduled_backup":[{"backup_location":"gs://BUCKET_NAME/FOLDER_NAME/","cron_schedule":null,"enabled":true}],"service_id":"c","terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"after_unknown":{"artifact_gcs_uri":true,"create_time":true,"effective_labels":{},"encryption_config":[],"endpoint_uri":true,"hive_metastore_config":[],"id":true,"maintenance_window":[],"metadata_integration":[],"name":true,"network":true,"network_config":[],"port":true,"scaling_config":[],"scheduled_backup":[{"time_zone":true}],"state":true,"state_message":true,"telemetry_config":true,"terraform_labels":{},"tier":true,"uid":true,"update_time":true},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"encryption_config":[],"hive_metastore_config":[],"maintenance_window":[],"metadata_integration":[],"network_config":[],"scaling_config":[],"scheduled_backup":[{}],"telemetry_config":[],"terraform_labels":{}}}},{"address":"google_dataproc_metastore_service.nc","mode":"managed","type":"google_dataproc_metastore_service","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"database_type":"MYSQL","deletion_protection":null,"effective_labels":{"goog-terraform-provisioned":"true"},"encryption_config":[],"hive_metastore_config":[],"labels":null,"location":"global","maintenance_window":[],"metadata_integration":[],"network_config":[],"project":"1","release_channel":"STABLE","scaling_config":[],"scheduled_backup":[{"backup_location":"invalid-location","cron_schedule":null,"enabled":false}],"service_id":"nc","terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"after_unknown":{"artifact_gcs_uri":true,"create_time":true,"effective_labels":{},"encryption_config":[],"endpoint_uri":true,"hive_metastore_config":[],"id":true,"maintenance_window":[],"metadata_integration":[],"name":true,"network":true,"network_config":[],"port":true,"scaling_config":[],"scheduled_backup":[{"time_zone":true}],"state":true,"state_message":true,"telemetry_config":true,"terraform_labels":{},"tier":true,"uid":true,"update_time":true},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"encryption_config":[],"hive_metastore_config":[],"maintenance_window":[],"metadata_integration":[],"network_config":[],"scaling_config":[],"scheduled_backup":[{}],"telemetry_config":[],"terraform_labels":{}}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_dataproc_metastore_service.c","mode":"managed","type":"google_dataproc_metastore_service","name":"c","provider_config_key":"google","expressions":{"project":{"constant_value":1},"scheduled_backup":[{"backup_location":{"constant_value":"gs://BUCKET_NAME/FOLDER_NAME/"},"enabled":{"constant_value":true}}],"service_id":{"constant_value":"c"}},"schema_version":0},{"address":"google_dataproc_metastore_service.nc","mode":"managed","type":"google_dataproc_metastore_service","name":"nc","provider_config_key":"google","expressions":{"project":{"constant_value":1},"scheduled_backup":[{"backup_location":{"constant_value":"invalid-location"},"enabled":{"constant_value":false}}],"service_id":{"constant_value":"nc"}},"schema_version":0}]}},"timestamp":"2026-02-05T03:08:53Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/deploy/automation/service_account_validation/plan.json b/inputs/gcp/deploy/automation/service_account_validation/plan.json deleted file mode 100644 index adcb6b3d7..000000000 Binary files a/inputs/gcp/deploy/automation/service_account_validation/plan.json and /dev/null differ diff --git a/inputs/gcp/deploy/automation/suspended_check/plan.json b/inputs/gcp/deploy/automation/suspended_check/plan.json deleted file mode 100644 index 015d013ee..000000000 Binary files a/inputs/gcp/deploy/automation/suspended_check/plan.json and /dev/null differ diff --git a/inputs/gcp/deploy/custom_target_type/custom_actions_validation/plan.json b/inputs/gcp/deploy/custom_target_type/custom_actions_validation/plan.json deleted file mode 100644 index 8c5890953..000000000 Binary files a/inputs/gcp/deploy/custom_target_type/custom_actions_validation/plan.json and /dev/null differ diff --git a/inputs/gcp/deploy/custom_target_type_iam_binding/prohibited_members/plan.json b/inputs/gcp/deploy/custom_target_type_iam_binding/prohibited_members/plan.json deleted file mode 100644 index ff0325c76..000000000 Binary files a/inputs/gcp/deploy/custom_target_type_iam_binding/prohibited_members/plan.json and /dev/null differ diff --git a/inputs/gcp/deploy/custom_target_type_iam_binding/required_role/plan.json b/inputs/gcp/deploy/custom_target_type_iam_binding/required_role/plan.json deleted file mode 100644 index cc57bf951..000000000 Binary files a/inputs/gcp/deploy/custom_target_type_iam_binding/required_role/plan.json and /dev/null differ diff --git a/inputs/gcp/deploy/custom_target_type_iam_member/prohibited_member/plan.json b/inputs/gcp/deploy/custom_target_type_iam_member/prohibited_member/plan.json deleted file mode 100644 index 137eb120f..000000000 Binary files a/inputs/gcp/deploy/custom_target_type_iam_member/prohibited_member/plan.json and /dev/null differ diff --git a/inputs/gcp/deploy/custom_target_type_iam_member/required_role/plan.json b/inputs/gcp/deploy/custom_target_type_iam_member/required_role/plan.json deleted file mode 100644 index 889e6145b..000000000 Binary files a/inputs/gcp/deploy/custom_target_type_iam_member/required_role/plan.json and /dev/null differ diff --git a/inputs/gcp/deploy/custom_target_type_iam_policy/required_role/plan.json b/inputs/gcp/deploy/custom_target_type_iam_policy/required_role/plan.json deleted file mode 100644 index cb8a69de8..000000000 Binary files a/inputs/gcp/deploy/custom_target_type_iam_policy/required_role/plan.json and /dev/null differ diff --git a/inputs/gcp/deploy/delivery_pipeline/serial_pipeline_validation/plan.json b/inputs/gcp/deploy/delivery_pipeline/serial_pipeline_validation/plan.json deleted file mode 100644 index 06ac022ce..000000000 Binary files a/inputs/gcp/deploy/delivery_pipeline/serial_pipeline_validation/plan.json and /dev/null differ diff --git a/inputs/gcp/deploy/delivery_pipeline/suspended_check/plan.json b/inputs/gcp/deploy/delivery_pipeline/suspended_check/plan.json deleted file mode 100644 index 6f2c4adb9..000000000 Binary files a/inputs/gcp/deploy/delivery_pipeline/suspended_check/plan.json and /dev/null differ diff --git a/inputs/gcp/deploy/delivery_pipeline_iam_binding/prohibited_members/plan.json b/inputs/gcp/deploy/delivery_pipeline_iam_binding/prohibited_members/plan.json deleted file mode 100644 index 3a96fee8d..000000000 Binary files a/inputs/gcp/deploy/delivery_pipeline_iam_binding/prohibited_members/plan.json and /dev/null differ diff --git a/inputs/gcp/deploy/delivery_pipeline_iam_binding/required_role/plan.json b/inputs/gcp/deploy/delivery_pipeline_iam_binding/required_role/plan.json deleted file mode 100644 index cee48ccc0..000000000 Binary files a/inputs/gcp/deploy/delivery_pipeline_iam_binding/required_role/plan.json and /dev/null differ diff --git a/inputs/gcp/deploy/delivery_pipeline_iam_member/prohibited_member/plan.json b/inputs/gcp/deploy/delivery_pipeline_iam_member/prohibited_member/plan.json deleted file mode 100644 index ffd20d8ab..000000000 Binary files a/inputs/gcp/deploy/delivery_pipeline_iam_member/prohibited_member/plan.json and /dev/null differ diff --git a/inputs/gcp/deploy/delivery_pipeline_iam_member/required_role/plan.json b/inputs/gcp/deploy/delivery_pipeline_iam_member/required_role/plan.json deleted file mode 100644 index 3dbcc81a6..000000000 Binary files a/inputs/gcp/deploy/delivery_pipeline_iam_member/required_role/plan.json and /dev/null differ diff --git a/inputs/gcp/deploy/delivery_pipeline_iam_policy/required_role/plan.json b/inputs/gcp/deploy/delivery_pipeline_iam_policy/required_role/plan.json deleted file mode 100644 index b519dc75b..000000000 Binary files a/inputs/gcp/deploy/delivery_pipeline_iam_policy/required_role/plan.json and /dev/null differ diff --git a/inputs/gcp/deploy/deploy_policy/suspended_check/plan.json b/inputs/gcp/deploy/deploy_policy/suspended_check/plan.json deleted file mode 100644 index d9191e080..000000000 Binary files a/inputs/gcp/deploy/deploy_policy/suspended_check/plan.json and /dev/null differ diff --git a/inputs/gcp/deploy/target/gke_configuration/plan.json b/inputs/gcp/deploy/target/gke_configuration/plan.json deleted file mode 100644 index 9c5309a9e..000000000 Binary files a/inputs/gcp/deploy/target/gke_configuration/plan.json and /dev/null differ diff --git a/inputs/gcp/deploy/target/require_approval_check/plan.json b/inputs/gcp/deploy/target/require_approval_check/plan.json deleted file mode 100644 index a50574325..000000000 Binary files a/inputs/gcp/deploy/target/require_approval_check/plan.json and /dev/null differ diff --git a/inputs/gcp/deploy/target/run_configuration/plan.json b/inputs/gcp/deploy/target/run_configuration/plan.json deleted file mode 100644 index b27e10d6b..000000000 Binary files a/inputs/gcp/deploy/target/run_configuration/plan.json and /dev/null differ diff --git a/inputs/gcp/deploy/target_iam_binding/prohibited_members/plan.json b/inputs/gcp/deploy/target_iam_binding/prohibited_members/plan.json deleted file mode 100644 index 4fa880363..000000000 Binary files a/inputs/gcp/deploy/target_iam_binding/prohibited_members/plan.json and /dev/null differ diff --git a/inputs/gcp/deploy/target_iam_binding/required_role/plan.json b/inputs/gcp/deploy/target_iam_binding/required_role/plan.json deleted file mode 100644 index 44eca7d8f..000000000 Binary files a/inputs/gcp/deploy/target_iam_binding/required_role/plan.json and /dev/null differ diff --git a/inputs/gcp/deploy/target_iam_member/prohibited_member/plan.json b/inputs/gcp/deploy/target_iam_member/prohibited_member/plan.json deleted file mode 100644 index b05b62d3c..000000000 Binary files a/inputs/gcp/deploy/target_iam_member/prohibited_member/plan.json and /dev/null differ diff --git a/inputs/gcp/deploy/target_iam_member/required_role/plan.json b/inputs/gcp/deploy/target_iam_member/required_role/plan.json deleted file mode 100644 index 096e9da9b..000000000 Binary files a/inputs/gcp/deploy/target_iam_member/required_role/plan.json and /dev/null differ diff --git a/inputs/gcp/deploy/target_iam_policy/required_role/plan.json b/inputs/gcp/deploy/target_iam_policy/required_role/plan.json deleted file mode 100644 index 285b4b2f7..000000000 Binary files a/inputs/gcp/deploy/target_iam_policy/required_role/plan.json and /dev/null differ diff --git a/inputs/gcp/discovery_engine/chat_engine/chat_engine_config/plan b/inputs/gcp/discovery_engine/chat_engine/chat_engine_config/plan deleted file mode 100644 index e835c366a..000000000 Binary files a/inputs/gcp/discovery_engine/chat_engine/chat_engine_config/plan and /dev/null differ diff --git a/inputs/gcp/discovery_engine/chat_engine/chat_engine_config/plan.json b/inputs/gcp/discovery_engine/chat_engine/chat_engine_config/plan.json deleted file mode 100644 index a5b3e308c..000000000 Binary files a/inputs/gcp/discovery_engine/chat_engine/chat_engine_config/plan.json and /dev/null differ diff --git a/inputs/gcp/discovery_engine/chat_engine/chat_engine_location/plan b/inputs/gcp/discovery_engine/chat_engine/chat_engine_location/plan deleted file mode 100644 index 50d7aa761..000000000 Binary files a/inputs/gcp/discovery_engine/chat_engine/chat_engine_location/plan and /dev/null differ diff --git a/inputs/gcp/discovery_engine/chat_engine/chat_engine_location/plan.json b/inputs/gcp/discovery_engine/chat_engine/chat_engine_location/plan.json deleted file mode 100644 index f9be1dde1..000000000 Binary files a/inputs/gcp/discovery_engine/chat_engine/chat_engine_location/plan.json and /dev/null differ diff --git a/inputs/gcp/discovery_engine/cmek_config/cmek_config_kms_key/plan b/inputs/gcp/discovery_engine/cmek_config/cmek_config_kms_key/plan deleted file mode 100644 index 2349301c1..000000000 Binary files a/inputs/gcp/discovery_engine/cmek_config/cmek_config_kms_key/plan and /dev/null differ diff --git a/inputs/gcp/discovery_engine/cmek_config/cmek_config_kms_key/plan.json b/inputs/gcp/discovery_engine/cmek_config/cmek_config_kms_key/plan.json deleted file mode 100644 index 17ce16180..000000000 Binary files a/inputs/gcp/discovery_engine/cmek_config/cmek_config_kms_key/plan.json and /dev/null differ diff --git a/inputs/gcp/discovery_engine/cmek_config/cmek_config_location/plan b/inputs/gcp/discovery_engine/cmek_config/cmek_config_location/plan deleted file mode 100644 index 91af0a9b9..000000000 Binary files a/inputs/gcp/discovery_engine/cmek_config/cmek_config_location/plan and /dev/null differ diff --git a/inputs/gcp/discovery_engine/cmek_config/cmek_config_location/plan.json b/inputs/gcp/discovery_engine/cmek_config/cmek_config_location/plan.json deleted file mode 100644 index d678c11aa..000000000 Binary files a/inputs/gcp/discovery_engine/cmek_config/cmek_config_location/plan.json and /dev/null differ diff --git a/inputs/gcp/discovery_engine/cmek_config/cmek_config_single_region_keys/plan b/inputs/gcp/discovery_engine/cmek_config/cmek_config_single_region_keys/plan deleted file mode 100644 index c6f0c475f..000000000 Binary files a/inputs/gcp/discovery_engine/cmek_config/cmek_config_single_region_keys/plan and /dev/null differ diff --git a/inputs/gcp/discovery_engine/cmek_config/cmek_config_single_region_keys/plan.json b/inputs/gcp/discovery_engine/cmek_config/cmek_config_single_region_keys/plan.json deleted file mode 100644 index 413a2797d..000000000 Binary files a/inputs/gcp/discovery_engine/cmek_config/cmek_config_single_region_keys/plan.json and /dev/null differ diff --git a/inputs/gcp/discovery_engine/data_store/data_store_content_config/plan b/inputs/gcp/discovery_engine/data_store/data_store_content_config/plan deleted file mode 100644 index 31cf69ac0..000000000 Binary files a/inputs/gcp/discovery_engine/data_store/data_store_content_config/plan and /dev/null differ diff --git a/inputs/gcp/discovery_engine/data_store/data_store_content_config/plan.json b/inputs/gcp/discovery_engine/data_store/data_store_content_config/plan.json deleted file mode 100644 index 01ba5f82d..000000000 Binary files a/inputs/gcp/discovery_engine/data_store/data_store_content_config/plan.json and /dev/null differ diff --git a/inputs/gcp/discovery_engine/data_store/data_store_document_processing_config/plan b/inputs/gcp/discovery_engine/data_store/data_store_document_processing_config/plan deleted file mode 100644 index 4638ea533..000000000 Binary files a/inputs/gcp/discovery_engine/data_store/data_store_document_processing_config/plan and /dev/null differ diff --git a/inputs/gcp/discovery_engine/data_store/data_store_document_processing_config/plan.json b/inputs/gcp/discovery_engine/data_store/data_store_document_processing_config/plan.json deleted file mode 100644 index b20313b05..000000000 Binary files a/inputs/gcp/discovery_engine/data_store/data_store_document_processing_config/plan.json and /dev/null differ diff --git a/inputs/gcp/discovery_engine/data_store/data_store_kms_key_name/plan b/inputs/gcp/discovery_engine/data_store/data_store_kms_key_name/plan deleted file mode 100644 index bfdf9a9f5..000000000 Binary files a/inputs/gcp/discovery_engine/data_store/data_store_kms_key_name/plan and /dev/null differ diff --git a/inputs/gcp/discovery_engine/data_store/data_store_kms_key_name/plan.json b/inputs/gcp/discovery_engine/data_store/data_store_kms_key_name/plan.json deleted file mode 100644 index 40daf638f..000000000 Binary files a/inputs/gcp/discovery_engine/data_store/data_store_kms_key_name/plan.json and /dev/null differ diff --git a/inputs/gcp/discovery_engine/data_store/data_store_location/plan b/inputs/gcp/discovery_engine/data_store/data_store_location/plan deleted file mode 100644 index 70d7c47d4..000000000 Binary files a/inputs/gcp/discovery_engine/data_store/data_store_location/plan and /dev/null differ diff --git a/inputs/gcp/discovery_engine/data_store/data_store_location/plan.json b/inputs/gcp/discovery_engine/data_store/data_store_location/plan.json deleted file mode 100644 index 7bac4fabc..000000000 Binary files a/inputs/gcp/discovery_engine/data_store/data_store_location/plan.json and /dev/null differ diff --git a/inputs/gcp/discovery_engine/engine_schema/engine_schema_json/plan b/inputs/gcp/discovery_engine/engine_schema/engine_schema_json/plan deleted file mode 100644 index ae5f2c6d8..000000000 Binary files a/inputs/gcp/discovery_engine/engine_schema/engine_schema_json/plan and /dev/null differ diff --git a/inputs/gcp/discovery_engine/engine_schema/engine_schema_json/plan.json b/inputs/gcp/discovery_engine/engine_schema/engine_schema_json/plan.json deleted file mode 100644 index 3b54d086e..000000000 Binary files a/inputs/gcp/discovery_engine/engine_schema/engine_schema_json/plan.json and /dev/null differ diff --git a/inputs/gcp/discovery_engine/engine_schema/engine_schema_location/plan b/inputs/gcp/discovery_engine/engine_schema/engine_schema_location/plan deleted file mode 100644 index 2b7e89326..000000000 Binary files a/inputs/gcp/discovery_engine/engine_schema/engine_schema_location/plan and /dev/null differ diff --git a/inputs/gcp/discovery_engine/engine_schema/engine_schema_location/plan.json b/inputs/gcp/discovery_engine/engine_schema/engine_schema_location/plan.json deleted file mode 100644 index ad517aa35..000000000 Binary files a/inputs/gcp/discovery_engine/engine_schema/engine_schema_location/plan.json and /dev/null differ diff --git a/inputs/gcp/discovery_engine/search_engine/search_engine_industry_vertical/plan b/inputs/gcp/discovery_engine/search_engine/search_engine_industry_vertical/plan deleted file mode 100644 index c71334e91..000000000 Binary files a/inputs/gcp/discovery_engine/search_engine/search_engine_industry_vertical/plan and /dev/null differ diff --git a/inputs/gcp/discovery_engine/search_engine/search_engine_industry_vertical/plan.json b/inputs/gcp/discovery_engine/search_engine/search_engine_industry_vertical/plan.json deleted file mode 100644 index 79cbb4366..000000000 Binary files a/inputs/gcp/discovery_engine/search_engine/search_engine_industry_vertical/plan.json and /dev/null differ diff --git a/inputs/gcp/firebase_hosting/google_firebase_hosting_custom_domain/custom_domain_verification/.terraform.lock.hcl b/inputs/gcp/firebase_hosting/google_firebase_hosting_custom_domain/custom_domain_verification/.terraform.lock.hcl index e6d1743e5..f9a88ea3b 100644 --- a/inputs/gcp/firebase_hosting/google_firebase_hosting_custom_domain/custom_domain_verification/.terraform.lock.hcl +++ b/inputs/gcp/firebase_hosting/google_firebase_hosting_custom_domain/custom_domain_verification/.terraform.lock.hcl @@ -5,6 +5,7 @@ provider "registry.terraform.io/hashicorp/google-beta" { version = "7.3.0" constraints = "~> 7.0" hashes = [ + "h1:fON6pWcrdigIVK32tti4TP98i11tFyFrPm4jiCutjbA=", "h1:tiAMrdQJQ0AipokJT5KBab9NcRdWUZMP/uw0d7ThTbg=", "zh:0fc81dbbb1e097ca0a8283dfc86ca90bd9921d9093fba4b6f95fafff16fd44e6", "zh:1946f9a40535833dff738b51ceb2202566edae35ce9f961cb909af2f7f942668", diff --git a/inputs/gcp/firebase_hosting/google_firebase_hosting_version/cache_control_secure/.terraform.lock.hcl b/inputs/gcp/firebase_hosting/google_firebase_hosting_version/cache_control_secure/.terraform.lock.hcl index e6d1743e5..f9a88ea3b 100644 --- a/inputs/gcp/firebase_hosting/google_firebase_hosting_version/cache_control_secure/.terraform.lock.hcl +++ b/inputs/gcp/firebase_hosting/google_firebase_hosting_version/cache_control_secure/.terraform.lock.hcl @@ -5,6 +5,7 @@ provider "registry.terraform.io/hashicorp/google-beta" { version = "7.3.0" constraints = "~> 7.0" hashes = [ + "h1:fON6pWcrdigIVK32tti4TP98i11tFyFrPm4jiCutjbA=", "h1:tiAMrdQJQ0AipokJT5KBab9NcRdWUZMP/uw0d7ThTbg=", "zh:0fc81dbbb1e097ca0a8283dfc86ca90bd9921d9093fba4b6f95fafff16fd44e6", "zh:1946f9a40535833dff738b51ceb2202566edae35ce9f961cb909af2f7f942668", diff --git a/inputs/gcp/firebase_hosting/google_firebase_hosting_version/cors_policy_secure/.terraform.lock.hcl b/inputs/gcp/firebase_hosting/google_firebase_hosting_version/cors_policy_secure/.terraform.lock.hcl index e6d1743e5..f9a88ea3b 100644 --- a/inputs/gcp/firebase_hosting/google_firebase_hosting_version/cors_policy_secure/.terraform.lock.hcl +++ b/inputs/gcp/firebase_hosting/google_firebase_hosting_version/cors_policy_secure/.terraform.lock.hcl @@ -5,6 +5,7 @@ provider "registry.terraform.io/hashicorp/google-beta" { version = "7.3.0" constraints = "~> 7.0" hashes = [ + "h1:fON6pWcrdigIVK32tti4TP98i11tFyFrPm4jiCutjbA=", "h1:tiAMrdQJQ0AipokJT5KBab9NcRdWUZMP/uw0d7ThTbg=", "zh:0fc81dbbb1e097ca0a8283dfc86ca90bd9921d9093fba4b6f95fafff16fd44e6", "zh:1946f9a40535833dff738b51ceb2202566edae35ce9f961cb909af2f7f942668", diff --git a/inputs/gcp/firebase_hosting/google_firebase_hosting_version/headers_security/.terraform.lock.hcl b/inputs/gcp/firebase_hosting/google_firebase_hosting_version/headers_security/.terraform.lock.hcl index e6d1743e5..f9a88ea3b 100644 --- a/inputs/gcp/firebase_hosting/google_firebase_hosting_version/headers_security/.terraform.lock.hcl +++ b/inputs/gcp/firebase_hosting/google_firebase_hosting_version/headers_security/.terraform.lock.hcl @@ -5,6 +5,7 @@ provider "registry.terraform.io/hashicorp/google-beta" { version = "7.3.0" constraints = "~> 7.0" hashes = [ + "h1:fON6pWcrdigIVK32tti4TP98i11tFyFrPm4jiCutjbA=", "h1:tiAMrdQJQ0AipokJT5KBab9NcRdWUZMP/uw0d7ThTbg=", "zh:0fc81dbbb1e097ca0a8283dfc86ca90bd9921d9093fba4b6f95fafff16fd44e6", "zh:1946f9a40535833dff738b51ceb2202566edae35ce9f961cb909af2f7f942668", diff --git a/inputs/gcp/firebase_hosting/google_firebase_hosting_version/redirect_rules_secure/.terraform.lock.hcl b/inputs/gcp/firebase_hosting/google_firebase_hosting_version/redirect_rules_secure/.terraform.lock.hcl index e6d1743e5..f9a88ea3b 100644 --- a/inputs/gcp/firebase_hosting/google_firebase_hosting_version/redirect_rules_secure/.terraform.lock.hcl +++ b/inputs/gcp/firebase_hosting/google_firebase_hosting_version/redirect_rules_secure/.terraform.lock.hcl @@ -5,6 +5,7 @@ provider "registry.terraform.io/hashicorp/google-beta" { version = "7.3.0" constraints = "~> 7.0" hashes = [ + "h1:fON6pWcrdigIVK32tti4TP98i11tFyFrPm4jiCutjbA=", "h1:tiAMrdQJQ0AipokJT5KBab9NcRdWUZMP/uw0d7ThTbg=", "zh:0fc81dbbb1e097ca0a8283dfc86ca90bd9921d9093fba4b6f95fafff16fd44e6", "zh:1946f9a40535833dff738b51ceb2202566edae35ce9f961cb909af2f7f942668", diff --git a/inputs/gcp/firebase_hosting/google_firebase_hosting_version/rewrite_rules_secure/.terraform.lock.hcl b/inputs/gcp/firebase_hosting/google_firebase_hosting_version/rewrite_rules_secure/.terraform.lock.hcl index e6d1743e5..f9a88ea3b 100644 --- a/inputs/gcp/firebase_hosting/google_firebase_hosting_version/rewrite_rules_secure/.terraform.lock.hcl +++ b/inputs/gcp/firebase_hosting/google_firebase_hosting_version/rewrite_rules_secure/.terraform.lock.hcl @@ -5,6 +5,7 @@ provider "registry.terraform.io/hashicorp/google-beta" { version = "7.3.0" constraints = "~> 7.0" hashes = [ + "h1:fON6pWcrdigIVK32tti4TP98i11tFyFrPm4jiCutjbA=", "h1:tiAMrdQJQ0AipokJT5KBab9NcRdWUZMP/uw0d7ThTbg=", "zh:0fc81dbbb1e097ca0a8283dfc86ca90bd9921d9093fba4b6f95fafff16fd44e6", "zh:1946f9a40535833dff738b51ceb2202566edae35ce9f961cb909af2f7f942668", diff --git a/inputs/gcp/firebase_realtime_database/google_firebase_databass_instance/desired_state/.terraform.lock.hcl b/inputs/gcp/firebase_realtime_database/google_firebase_database_instance/desired_state/.terraform.lock.hcl similarity index 100% rename from inputs/gcp/firebase_realtime_database/google_firebase_databass_instance/desired_state/.terraform.lock.hcl rename to inputs/gcp/firebase_realtime_database/google_firebase_database_instance/desired_state/.terraform.lock.hcl diff --git a/inputs/gcp/firebase_realtime_database/google_firebase_databass_instance/desired_state/c.tf b/inputs/gcp/firebase_realtime_database/google_firebase_database_instance/desired_state/c.tf similarity index 100% rename from inputs/gcp/firebase_realtime_database/google_firebase_databass_instance/desired_state/c.tf rename to inputs/gcp/firebase_realtime_database/google_firebase_database_instance/desired_state/c.tf diff --git a/inputs/gcp/firebase_realtime_database/google_firebase_databass_instance/desired_state/config.tf b/inputs/gcp/firebase_realtime_database/google_firebase_database_instance/desired_state/config.tf similarity index 100% rename from inputs/gcp/firebase_realtime_database/google_firebase_databass_instance/desired_state/config.tf rename to inputs/gcp/firebase_realtime_database/google_firebase_database_instance/desired_state/config.tf diff --git a/inputs/gcp/firebase_realtime_database/google_firebase_databass_instance/desired_state/nc.tf b/inputs/gcp/firebase_realtime_database/google_firebase_database_instance/desired_state/nc.tf similarity index 100% rename from inputs/gcp/firebase_realtime_database/google_firebase_databass_instance/desired_state/nc.tf rename to inputs/gcp/firebase_realtime_database/google_firebase_database_instance/desired_state/nc.tf diff --git a/inputs/gcp/firebase_realtime_database/google_firebase_databass_instance/type/.terraform.lock.hcl b/inputs/gcp/firebase_realtime_database/google_firebase_database_instance/type/.terraform.lock.hcl similarity index 100% rename from inputs/gcp/firebase_realtime_database/google_firebase_databass_instance/type/.terraform.lock.hcl rename to inputs/gcp/firebase_realtime_database/google_firebase_database_instance/type/.terraform.lock.hcl diff --git a/inputs/gcp/firebase_realtime_database/google_firebase_databass_instance/type/c.tf b/inputs/gcp/firebase_realtime_database/google_firebase_database_instance/type/c.tf similarity index 100% rename from inputs/gcp/firebase_realtime_database/google_firebase_databass_instance/type/c.tf rename to inputs/gcp/firebase_realtime_database/google_firebase_database_instance/type/c.tf diff --git a/inputs/gcp/firebase_realtime_database/google_firebase_databass_instance/type/config.tf b/inputs/gcp/firebase_realtime_database/google_firebase_database_instance/type/config.tf similarity index 100% rename from inputs/gcp/firebase_realtime_database/google_firebase_databass_instance/type/config.tf rename to inputs/gcp/firebase_realtime_database/google_firebase_database_instance/type/config.tf diff --git a/inputs/gcp/firebase_realtime_database/google_firebase_databass_instance/type/nc.tf b/inputs/gcp/firebase_realtime_database/google_firebase_database_instance/type/nc.tf similarity index 100% rename from inputs/gcp/firebase_realtime_database/google_firebase_databass_instance/type/nc.tf rename to inputs/gcp/firebase_realtime_database/google_firebase_database_instance/type/nc.tf diff --git a/inputs/gcp/firestore/firestore_backup_schedule/daily_recurrence/plan.json b/inputs/gcp/firestore/firestore_backup_schedule/daily_recurrence/plan.json new file mode 100644 index 000000000..43e10964b --- /dev/null +++ b/inputs/gcp/firestore/firestore_backup_schedule/daily_recurrence/plan.json @@ -0,0 +1 @@ +{"format_version":"1.2","terraform_version":"1.13.3","planned_values":{"root_module":{"resources":[{"address":"google_firestore_backup_schedule.c","mode":"managed","type":"google_firestore_backup_schedule","name":"c","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"daily_recurrence":[],"database":"(default)","project":"c","retention":"8467200s","timeouts":null,"weekly_recurrence":[{"day":null}]},"sensitive_values":{"daily_recurrence":[],"weekly_recurrence":[{}]}},{"address":"google_firestore_backup_schedule.nc","mode":"managed","type":"google_firestore_backup_schedule","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"daily_recurrence":[{}],"database":"(default)","project":"nc","retention":"8467200s","timeouts":null,"weekly_recurrence":[]},"sensitive_values":{"daily_recurrence":[{}],"weekly_recurrence":[]}}]}},"resource_changes":[{"address":"google_firestore_backup_schedule.c","mode":"managed","type":"google_firestore_backup_schedule","name":"c","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"daily_recurrence":[],"database":"(default)","project":"c","retention":"8467200s","timeouts":null,"weekly_recurrence":[{"day":null}]},"after_unknown":{"daily_recurrence":[],"id":true,"name":true,"weekly_recurrence":[{}]},"before_sensitive":false,"after_sensitive":{"daily_recurrence":[],"weekly_recurrence":[{}]}}},{"address":"google_firestore_backup_schedule.nc","mode":"managed","type":"google_firestore_backup_schedule","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"daily_recurrence":[{}],"database":"(default)","project":"nc","retention":"8467200s","timeouts":null,"weekly_recurrence":[]},"after_unknown":{"daily_recurrence":[{}],"id":true,"name":true,"weekly_recurrence":[]},"before_sensitive":false,"after_sensitive":{"daily_recurrence":[{}],"weekly_recurrence":[]}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google","version_constraint":"\u003e= 6.15.0"}},"root_module":{"resources":[{"address":"google_firestore_backup_schedule.c","mode":"managed","type":"google_firestore_backup_schedule","name":"c","provider_config_key":"google","expressions":{"project":{"constant_value":"c"},"retention":{"constant_value":"8467200s"},"weekly_recurrence":[{}]},"schema_version":0},{"address":"google_firestore_backup_schedule.nc","mode":"managed","type":"google_firestore_backup_schedule","name":"nc","provider_config_key":"google","expressions":{"daily_recurrence":[{}],"project":{"constant_value":"nc"},"retention":{"constant_value":"8467200s"}},"schema_version":0}]}},"timestamp":"2026-02-05T03:14:44Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/firestore/firestore_backup_schedule/retention/plan.json b/inputs/gcp/firestore/firestore_backup_schedule/retention/plan.json new file mode 100644 index 000000000..d4c6ba26d --- /dev/null +++ b/inputs/gcp/firestore/firestore_backup_schedule/retention/plan.json @@ -0,0 +1 @@ +{"format_version":"1.2","terraform_version":"1.13.3","planned_values":{"root_module":{"resources":[{"address":"google_firestore_backup_schedule.c","mode":"managed","type":"google_firestore_backup_schedule","name":"c","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"daily_recurrence":[{}],"database":"(default)","project":"c","retention":"8467200","timeouts":null,"weekly_recurrence":[]},"sensitive_values":{"daily_recurrence":[{}],"weekly_recurrence":[]}},{"address":"google_firestore_backup_schedule.nc","mode":"managed","type":"google_firestore_backup_schedule","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"daily_recurrence":[{}],"database":"(default)","project":"nc","retention":"1","timeouts":null,"weekly_recurrence":[]},"sensitive_values":{"daily_recurrence":[{}],"weekly_recurrence":[]}}]}},"resource_changes":[{"address":"google_firestore_backup_schedule.c","mode":"managed","type":"google_firestore_backup_schedule","name":"c","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"daily_recurrence":[{}],"database":"(default)","project":"c","retention":"8467200","timeouts":null,"weekly_recurrence":[]},"after_unknown":{"daily_recurrence":[{}],"id":true,"name":true,"weekly_recurrence":[]},"before_sensitive":false,"after_sensitive":{"daily_recurrence":[{}],"weekly_recurrence":[]}}},{"address":"google_firestore_backup_schedule.nc","mode":"managed","type":"google_firestore_backup_schedule","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"daily_recurrence":[{}],"database":"(default)","project":"nc","retention":"1","timeouts":null,"weekly_recurrence":[]},"after_unknown":{"daily_recurrence":[{}],"id":true,"name":true,"weekly_recurrence":[]},"before_sensitive":false,"after_sensitive":{"daily_recurrence":[{}],"weekly_recurrence":[]}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google","version_constraint":"\u003e= 6.15.0"}},"root_module":{"resources":[{"address":"google_firestore_backup_schedule.c","mode":"managed","type":"google_firestore_backup_schedule","name":"c","provider_config_key":"google","expressions":{"daily_recurrence":[{}],"project":{"constant_value":"c"},"retention":{"constant_value":"8467200"}},"schema_version":0},{"address":"google_firestore_backup_schedule.nc","mode":"managed","type":"google_firestore_backup_schedule","name":"nc","provider_config_key":"google","expressions":{"daily_recurrence":[{}],"project":{"constant_value":"nc"},"retention":{"constant_value":"1"}},"schema_version":0}]}},"timestamp":"2026-02-05T03:14:44Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/firestore/firestore_backup_schedule/weekly_recurrence/plan.json b/inputs/gcp/firestore/firestore_backup_schedule/weekly_recurrence/plan.json new file mode 100644 index 000000000..547586cce --- /dev/null +++ b/inputs/gcp/firestore/firestore_backup_schedule/weekly_recurrence/plan.json @@ -0,0 +1 @@ +{"format_version":"1.2","terraform_version":"1.13.3","planned_values":{"root_module":{"resources":[{"address":"google_firestore_backup_schedule.c","mode":"managed","type":"google_firestore_backup_schedule","name":"c","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"daily_recurrence":[],"database":"(default)","project":"c","retention":"8467200s","timeouts":null,"weekly_recurrence":[{"day":"MONDAY"}]},"sensitive_values":{"daily_recurrence":[],"weekly_recurrence":[{}]}},{"address":"google_firestore_backup_schedule.nc","mode":"managed","type":"google_firestore_backup_schedule","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"daily_recurrence":[],"database":"(default)","project":"nc","retention":"8467200s","timeouts":null,"weekly_recurrence":[{"day":"FRIDAY"}]},"sensitive_values":{"daily_recurrence":[],"weekly_recurrence":[{}]}}]}},"resource_changes":[{"address":"google_firestore_backup_schedule.c","mode":"managed","type":"google_firestore_backup_schedule","name":"c","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"daily_recurrence":[],"database":"(default)","project":"c","retention":"8467200s","timeouts":null,"weekly_recurrence":[{"day":"MONDAY"}]},"after_unknown":{"daily_recurrence":[],"id":true,"name":true,"weekly_recurrence":[{}]},"before_sensitive":false,"after_sensitive":{"daily_recurrence":[],"weekly_recurrence":[{}]}}},{"address":"google_firestore_backup_schedule.nc","mode":"managed","type":"google_firestore_backup_schedule","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"daily_recurrence":[],"database":"(default)","project":"nc","retention":"8467200s","timeouts":null,"weekly_recurrence":[{"day":"FRIDAY"}]},"after_unknown":{"daily_recurrence":[],"id":true,"name":true,"weekly_recurrence":[{}]},"before_sensitive":false,"after_sensitive":{"daily_recurrence":[],"weekly_recurrence":[{}]}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google","version_constraint":"\u003e= 6.15.0"}},"root_module":{"resources":[{"address":"google_firestore_backup_schedule.c","mode":"managed","type":"google_firestore_backup_schedule","name":"c","provider_config_key":"google","expressions":{"project":{"constant_value":"c"},"retention":{"constant_value":"8467200s"},"weekly_recurrence":[{"day":{"constant_value":"MONDAY"}}]},"schema_version":0},{"address":"google_firestore_backup_schedule.nc","mode":"managed","type":"google_firestore_backup_schedule","name":"nc","provider_config_key":"google","expressions":{"project":{"constant_value":"nc"},"retention":{"constant_value":"8467200s"},"weekly_recurrence":[{"day":{"constant_value":"FRIDAY"}}]},"schema_version":0}]}},"timestamp":"2026-02-05T03:14:44Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/firestore/firestore_database/app_engine_integration_mode/plan.json b/inputs/gcp/firestore/firestore_database/app_engine_integration_mode/plan.json new file mode 100644 index 000000000..9de748094 --- /dev/null +++ b/inputs/gcp/firestore/firestore_database/app_engine_integration_mode/plan.json @@ -0,0 +1 @@ +{"format_version":"1.2","terraform_version":"1.13.3","planned_values":{"root_module":{"resources":[{"address":"google_firestore_database.c","mode":"managed","type":"google_firestore_database","name":"c","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"app_engine_integration_mode":"DISABLED","cmek_config":[],"concurrency_mode":"OPTIMISTIC","delete_protection_state":"DELETE_PROTECTION_ENABLED","deletion_policy":"DELETE","location_id":"nam5","name":"c","point_in_time_recovery_enablement":"POINT_IN_TIME_RECOVERY_ENABLED","project":"c","tags":null,"timeouts":null,"type":"FIRESTORE_NATIVE"},"sensitive_values":{"cmek_config":[]}},{"address":"google_firestore_database.nc","mode":"managed","type":"google_firestore_database","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"cmek_config":[],"concurrency_mode":"OPTIMISTIC","delete_protection_state":"DELETE_PROTECTION_ENABLED","deletion_policy":"DELETE","location_id":"nam5","name":"nc","point_in_time_recovery_enablement":"POINT_IN_TIME_RECOVERY_ENABLED","project":"nc","tags":null,"timeouts":null,"type":"FIRESTORE_NATIVE"},"sensitive_values":{"cmek_config":[]}}]}},"resource_changes":[{"address":"google_firestore_database.c","mode":"managed","type":"google_firestore_database","name":"c","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"app_engine_integration_mode":"DISABLED","cmek_config":[],"concurrency_mode":"OPTIMISTIC","delete_protection_state":"DELETE_PROTECTION_ENABLED","deletion_policy":"DELETE","location_id":"nam5","name":"c","point_in_time_recovery_enablement":"POINT_IN_TIME_RECOVERY_ENABLED","project":"c","tags":null,"timeouts":null,"type":"FIRESTORE_NATIVE"},"after_unknown":{"cmek_config":[],"create_time":true,"database_edition":true,"earliest_version_time":true,"etag":true,"id":true,"key_prefix":true,"uid":true,"update_time":true,"version_retention_period":true},"before_sensitive":false,"after_sensitive":{"cmek_config":[]}}},{"address":"google_firestore_database.nc","mode":"managed","type":"google_firestore_database","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"cmek_config":[],"concurrency_mode":"OPTIMISTIC","delete_protection_state":"DELETE_PROTECTION_ENABLED","deletion_policy":"DELETE","location_id":"nam5","name":"nc","point_in_time_recovery_enablement":"POINT_IN_TIME_RECOVERY_ENABLED","project":"nc","tags":null,"timeouts":null,"type":"FIRESTORE_NATIVE"},"after_unknown":{"app_engine_integration_mode":true,"cmek_config":[],"create_time":true,"database_edition":true,"earliest_version_time":true,"etag":true,"id":true,"key_prefix":true,"uid":true,"update_time":true,"version_retention_period":true},"before_sensitive":false,"after_sensitive":{"cmek_config":[]}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_firestore_database.c","mode":"managed","type":"google_firestore_database","name":"c","provider_config_key":"google","expressions":{"app_engine_integration_mode":{"constant_value":"DISABLED"},"concurrency_mode":{"constant_value":"OPTIMISTIC"},"delete_protection_state":{"constant_value":"DELETE_PROTECTION_ENABLED"},"deletion_policy":{"constant_value":"DELETE"},"location_id":{"constant_value":"nam5"},"name":{"constant_value":"c"},"point_in_time_recovery_enablement":{"constant_value":"POINT_IN_TIME_RECOVERY_ENABLED"},"project":{"constant_value":"c"},"type":{"constant_value":"FIRESTORE_NATIVE"}},"schema_version":0},{"address":"google_firestore_database.nc","mode":"managed","type":"google_firestore_database","name":"nc","provider_config_key":"google","expressions":{"concurrency_mode":{"constant_value":"OPTIMISTIC"},"delete_protection_state":{"constant_value":"DELETE_PROTECTION_ENABLED"},"deletion_policy":{"constant_value":"DELETE"},"location_id":{"constant_value":"nam5"},"name":{"constant_value":"nc"},"point_in_time_recovery_enablement":{"constant_value":"POINT_IN_TIME_RECOVERY_ENABLED"},"project":{"constant_value":"nc"},"type":{"constant_value":"FIRESTORE_NATIVE"}},"schema_version":0}]}},"timestamp":"2026-02-05T03:14:44Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/firestore/firestore_database/concurrency_mode/plan.json b/inputs/gcp/firestore/firestore_database/concurrency_mode/plan.json new file mode 100644 index 000000000..d8674f9bc --- /dev/null +++ b/inputs/gcp/firestore/firestore_database/concurrency_mode/plan.json @@ -0,0 +1 @@ +{"format_version":"1.2","terraform_version":"1.13.3","planned_values":{"root_module":{"resources":[{"address":"google_firestore_database.c","mode":"managed","type":"google_firestore_database","name":"c","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"app_engine_integration_mode":"DISABLED","cmek_config":[],"concurrency_mode":"OPTIMISTIC","delete_protection_state":"DELETE_PROTECTION_ENABLED","deletion_policy":"DELETE","location_id":"nam5","name":"c","point_in_time_recovery_enablement":"POINT_IN_TIME_RECOVERY_ENABLED","project":"c","tags":null,"timeouts":null,"type":"FIRESTORE_NATIVE"},"sensitive_values":{"cmek_config":[]}},{"address":"google_firestore_database.nc","mode":"managed","type":"google_firestore_database","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"app_engine_integration_mode":"DISABLED","cmek_config":[],"delete_protection_state":"DELETE_PROTECTION_ENABLED","deletion_policy":"DELETE","location_id":"nam5","name":"nc","point_in_time_recovery_enablement":"POINT_IN_TIME_RECOVERY_ENABLED","project":"nc","tags":null,"timeouts":null,"type":"FIRESTORE_NATIVE"},"sensitive_values":{"cmek_config":[]}}]}},"resource_changes":[{"address":"google_firestore_database.c","mode":"managed","type":"google_firestore_database","name":"c","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"app_engine_integration_mode":"DISABLED","cmek_config":[],"concurrency_mode":"OPTIMISTIC","delete_protection_state":"DELETE_PROTECTION_ENABLED","deletion_policy":"DELETE","location_id":"nam5","name":"c","point_in_time_recovery_enablement":"POINT_IN_TIME_RECOVERY_ENABLED","project":"c","tags":null,"timeouts":null,"type":"FIRESTORE_NATIVE"},"after_unknown":{"cmek_config":[],"create_time":true,"database_edition":true,"earliest_version_time":true,"etag":true,"id":true,"key_prefix":true,"uid":true,"update_time":true,"version_retention_period":true},"before_sensitive":false,"after_sensitive":{"cmek_config":[]}}},{"address":"google_firestore_database.nc","mode":"managed","type":"google_firestore_database","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"app_engine_integration_mode":"DISABLED","cmek_config":[],"delete_protection_state":"DELETE_PROTECTION_ENABLED","deletion_policy":"DELETE","location_id":"nam5","name":"nc","point_in_time_recovery_enablement":"POINT_IN_TIME_RECOVERY_ENABLED","project":"nc","tags":null,"timeouts":null,"type":"FIRESTORE_NATIVE"},"after_unknown":{"cmek_config":[],"concurrency_mode":true,"create_time":true,"database_edition":true,"earliest_version_time":true,"etag":true,"id":true,"key_prefix":true,"uid":true,"update_time":true,"version_retention_period":true},"before_sensitive":false,"after_sensitive":{"cmek_config":[]}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_firestore_database.c","mode":"managed","type":"google_firestore_database","name":"c","provider_config_key":"google","expressions":{"app_engine_integration_mode":{"constant_value":"DISABLED"},"concurrency_mode":{"constant_value":"OPTIMISTIC"},"delete_protection_state":{"constant_value":"DELETE_PROTECTION_ENABLED"},"deletion_policy":{"constant_value":"DELETE"},"location_id":{"constant_value":"nam5"},"name":{"constant_value":"c"},"point_in_time_recovery_enablement":{"constant_value":"POINT_IN_TIME_RECOVERY_ENABLED"},"project":{"constant_value":"c"},"type":{"constant_value":"FIRESTORE_NATIVE"}},"schema_version":0},{"address":"google_firestore_database.nc","mode":"managed","type":"google_firestore_database","name":"nc","provider_config_key":"google","expressions":{"app_engine_integration_mode":{"constant_value":"DISABLED"},"delete_protection_state":{"constant_value":"DELETE_PROTECTION_ENABLED"},"deletion_policy":{"constant_value":"DELETE"},"location_id":{"constant_value":"nam5"},"name":{"constant_value":"nc"},"point_in_time_recovery_enablement":{"constant_value":"POINT_IN_TIME_RECOVERY_ENABLED"},"project":{"constant_value":"nc"},"type":{"constant_value":"FIRESTORE_NATIVE"}},"schema_version":0}]}},"timestamp":"2026-02-05T03:14:48Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/firestore/firestore_database/location_id/plan.json b/inputs/gcp/firestore/firestore_database/location_id/plan.json new file mode 100644 index 000000000..6742a9217 --- /dev/null +++ b/inputs/gcp/firestore/firestore_database/location_id/plan.json @@ -0,0 +1 @@ +{"format_version":"1.2","terraform_version":"1.13.3","planned_values":{"root_module":{"resources":[{"address":"google_firestore_database.c","mode":"managed","type":"google_firestore_database","name":"c","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"app_engine_integration_mode":"DISABLED","cmek_config":[],"concurrency_mode":"OPTIMISTIC","delete_protection_state":"DELETE_PROTECTION_ENABLED","deletion_policy":"DELETE","location_id":"nam5","name":"c","point_in_time_recovery_enablement":"POINT_IN_TIME_RECOVERY_ENABLED","project":"c","tags":null,"timeouts":null,"type":"FIRESTORE_NATIVE"},"sensitive_values":{"cmek_config":[]}},{"address":"google_firestore_database.nc","mode":"managed","type":"google_firestore_database","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"app_engine_integration_mode":"DISABLED","cmek_config":[],"concurrency_mode":"OPTIMISTIC","delete_protection_state":"DELETE_PROTECTION_ENABLED","deletion_policy":"DELETE","location_id":"","name":"nc","point_in_time_recovery_enablement":"POINT_IN_TIME_RECOVERY_ENABLED","project":"nc","tags":null,"timeouts":null,"type":"FIRESTORE_NATIVE"},"sensitive_values":{"cmek_config":[]}}]}},"resource_changes":[{"address":"google_firestore_database.c","mode":"managed","type":"google_firestore_database","name":"c","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"app_engine_integration_mode":"DISABLED","cmek_config":[],"concurrency_mode":"OPTIMISTIC","delete_protection_state":"DELETE_PROTECTION_ENABLED","deletion_policy":"DELETE","location_id":"nam5","name":"c","point_in_time_recovery_enablement":"POINT_IN_TIME_RECOVERY_ENABLED","project":"c","tags":null,"timeouts":null,"type":"FIRESTORE_NATIVE"},"after_unknown":{"cmek_config":[],"create_time":true,"database_edition":true,"earliest_version_time":true,"etag":true,"id":true,"key_prefix":true,"uid":true,"update_time":true,"version_retention_period":true},"before_sensitive":false,"after_sensitive":{"cmek_config":[]}}},{"address":"google_firestore_database.nc","mode":"managed","type":"google_firestore_database","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"app_engine_integration_mode":"DISABLED","cmek_config":[],"concurrency_mode":"OPTIMISTIC","delete_protection_state":"DELETE_PROTECTION_ENABLED","deletion_policy":"DELETE","location_id":"","name":"nc","point_in_time_recovery_enablement":"POINT_IN_TIME_RECOVERY_ENABLED","project":"nc","tags":null,"timeouts":null,"type":"FIRESTORE_NATIVE"},"after_unknown":{"cmek_config":[],"create_time":true,"database_edition":true,"earliest_version_time":true,"etag":true,"id":true,"key_prefix":true,"uid":true,"update_time":true,"version_retention_period":true},"before_sensitive":false,"after_sensitive":{"cmek_config":[]}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_firestore_database.c","mode":"managed","type":"google_firestore_database","name":"c","provider_config_key":"google","expressions":{"app_engine_integration_mode":{"constant_value":"DISABLED"},"concurrency_mode":{"constant_value":"OPTIMISTIC"},"delete_protection_state":{"constant_value":"DELETE_PROTECTION_ENABLED"},"deletion_policy":{"constant_value":"DELETE"},"location_id":{"constant_value":"nam5"},"name":{"constant_value":"c"},"point_in_time_recovery_enablement":{"constant_value":"POINT_IN_TIME_RECOVERY_ENABLED"},"project":{"constant_value":"c"},"type":{"constant_value":"FIRESTORE_NATIVE"}},"schema_version":0},{"address":"google_firestore_database.nc","mode":"managed","type":"google_firestore_database","name":"nc","provider_config_key":"google","expressions":{"app_engine_integration_mode":{"constant_value":"DISABLED"},"concurrency_mode":{"constant_value":"OPTIMISTIC"},"delete_protection_state":{"constant_value":"DELETE_PROTECTION_ENABLED"},"deletion_policy":{"constant_value":"DELETE"},"location_id":{"constant_value":""},"name":{"constant_value":"nc"},"point_in_time_recovery_enablement":{"constant_value":"POINT_IN_TIME_RECOVERY_ENABLED"},"project":{"constant_value":"nc"},"type":{"constant_value":"FIRESTORE_NATIVE"}},"schema_version":0}]}},"timestamp":"2026-02-05T03:14:48Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/firestore/firestore_document/collection/plan.json b/inputs/gcp/firestore/firestore_document/collection/plan.json new file mode 100644 index 000000000..1d5d0138b --- /dev/null +++ b/inputs/gcp/firestore/firestore_document/collection/plan.json @@ -0,0 +1 @@ +{"format_version":"1.2","terraform_version":"1.13.3","planned_values":{"root_module":{"resources":[{"address":"google_firestore_document.c","mode":"managed","type":"google_firestore_document","name":"c","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"collection":"my_collection","database":"(default)","document_id":"example_doc","fields":"{\"foo\":\"bar\"}","project":"c","timeouts":null},"sensitive_values":{}},{"address":"google_firestore_document.nc","mode":"managed","type":"google_firestore_document","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"collection":"user-private","database":"(default)","document_id":"example_doc_nc","fields":"{\"foo\":\"bar\"}","project":"nc","timeouts":null},"sensitive_values":{}}]}},"resource_changes":[{"address":"google_firestore_document.c","mode":"managed","type":"google_firestore_document","name":"c","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"collection":"my_collection","database":"(default)","document_id":"example_doc","fields":"{\"foo\":\"bar\"}","project":"c","timeouts":null},"after_unknown":{"create_time":true,"id":true,"name":true,"path":true,"update_time":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"google_firestore_document.nc","mode":"managed","type":"google_firestore_document","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"collection":"user-private","database":"(default)","document_id":"example_doc_nc","fields":"{\"foo\":\"bar\"}","project":"nc","timeouts":null},"after_unknown":{"create_time":true,"id":true,"name":true,"path":true,"update_time":true},"before_sensitive":false,"after_sensitive":{}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google","version_constraint":"\u003e= 6.15.0"}},"root_module":{"resources":[{"address":"google_firestore_document.c","mode":"managed","type":"google_firestore_document","name":"c","provider_config_key":"google","expressions":{"collection":{"constant_value":"my_collection"},"document_id":{"constant_value":"example_doc"},"fields":{},"project":{"constant_value":"c"}},"schema_version":0},{"address":"google_firestore_document.nc","mode":"managed","type":"google_firestore_document","name":"nc","provider_config_key":"google","expressions":{"collection":{"constant_value":"user-private"},"document_id":{"constant_value":"example_doc_nc"},"fields":{},"project":{"constant_value":"nc"}},"schema_version":0}]}},"timestamp":"2026-02-05T03:14:48Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/firestore/firestore_document/fields/plan.json b/inputs/gcp/firestore/firestore_document/fields/plan.json new file mode 100644 index 000000000..db27d5b72 --- /dev/null +++ b/inputs/gcp/firestore/firestore_document/fields/plan.json @@ -0,0 +1 @@ +{"format_version":"1.2","terraform_version":"1.13.3","planned_values":{"root_module":{"resources":[{"address":"google_firestore_document.c","mode":"managed","type":"google_firestore_document","name":"c","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"collection":"my_collection","database":"(default)","document_id":"example_doc","fields":"[{\"name\":\"field1\",\"value\":\"abc\"}]","project":"c","timeouts":null},"sensitive_values":{}},{"address":"google_firestore_document.nc","mode":"managed","type":"google_firestore_document","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"collection":"my_collection","database":"(default)","document_id":"example_doc","fields":"","project":"nc","timeouts":null},"sensitive_values":{}}]}},"resource_changes":[{"address":"google_firestore_document.c","mode":"managed","type":"google_firestore_document","name":"c","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"collection":"my_collection","database":"(default)","document_id":"example_doc","fields":"[{\"name\":\"field1\",\"value\":\"abc\"}]","project":"c","timeouts":null},"after_unknown":{"create_time":true,"id":true,"name":true,"path":true,"update_time":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"google_firestore_document.nc","mode":"managed","type":"google_firestore_document","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"collection":"my_collection","database":"(default)","document_id":"example_doc","fields":"","project":"nc","timeouts":null},"after_unknown":{"create_time":true,"id":true,"name":true,"path":true,"update_time":true},"before_sensitive":false,"after_sensitive":{}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google","version_constraint":"\u003e= 6.15.0"}},"root_module":{"resources":[{"address":"google_firestore_document.c","mode":"managed","type":"google_firestore_document","name":"c","provider_config_key":"google","expressions":{"collection":{"constant_value":"my_collection"},"document_id":{"constant_value":"example_doc"},"fields":{},"project":{"constant_value":"c"}},"schema_version":0},{"address":"google_firestore_document.nc","mode":"managed","type":"google_firestore_document","name":"nc","provider_config_key":"google","expressions":{"collection":{"constant_value":"my_collection"},"document_id":{"constant_value":"example_doc"},"fields":{"constant_value":""},"project":{"constant_value":"nc"}},"schema_version":0}]}},"timestamp":"2026-02-05T03:14:48Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/firestore/firestore_document/project/.terraform.lock.hcl b/inputs/gcp/firestore/firestore_document/project/.terraform.lock.hcl deleted file mode 100644 index 151e79163..000000000 --- a/inputs/gcp/firestore/firestore_document/project/.terraform.lock.hcl +++ /dev/null @@ -1,21 +0,0 @@ -# This file is maintained automatically by "terraform init". -# Manual edits may be lost in future updates. - -provider "registry.terraform.io/hashicorp/google" { - version = "7.3.0" - hashes = [ - "h1:1WxLeVFcyCHXxeujuSS2Alr72zMqDK4IaCQlGiROuD4=", - "zh:135c90b063f15c090ce82d99887032e495bbe6388764b666148ae78a776c4621", - "zh:47bb8721c29556b3b42f7c2ed73f8fdfb214609599ba819eebbe9ae33aab0e07", - "zh:532d385f6381eaee111d96296fcd9da7cdefb31b2afc81e36f390bd6ea1c5e99", - "zh:5c96018f5b722d2871ae2cf21dab9b05ec722270facd2e62393bcf89dc34852d", - "zh:703caf0829c30e3d166f61a7af208388840b384be1ec440b0955584856d22e30", - "zh:80b965cbe057eea5205c8bfd81fce642de7425dab86482f91bef136b3c1faaff", - "zh:a18b8178124d5dcd8a69bb6fc37206838f03699f2443e803142b1e2fde6f55d1", - "zh:bdddc969d92f5ecafbf762179e2291169a7e24214a52ff263aaf872b5cceb582", - "zh:e30f79beaf07618131a717734a58f7b5626c1c53d6cc14887c7098add73e0ccb", - "zh:e95fe5ec32e9eeff1d56379c84bee3fac0a7f12ea1b90f34ff7d88d469f56c23", - "zh:f569b65999264a9416862bca5cd2a6177d94ccb0424f3a4ef424428912b9cb3c", - "zh:fec21ae17d9d4e814d65ff377fbe1e2543636aaa3439a8a7a3447e7623044a4e", - ] -} diff --git a/inputs/gcp/firestore/firestore_document/project/c.tf b/inputs/gcp/firestore/firestore_document/project/c.tf deleted file mode 100644 index 221f29bde..000000000 --- a/inputs/gcp/firestore/firestore_document/project/c.tf +++ /dev/null @@ -1,6 +0,0 @@ -resource "google_firestore_document" "c" { - project = "c" - collection = "my_collection" - document_id = "example_doc" - fields = jsonencode({foo = "bar"}) -} diff --git a/inputs/gcp/firestore/firestore_document/project/nc.tf b/inputs/gcp/firestore/firestore_document/project/nc.tf deleted file mode 100644 index 1ac9ae5dc..000000000 --- a/inputs/gcp/firestore/firestore_document/project/nc.tf +++ /dev/null @@ -1,6 +0,0 @@ -resource "google_firestore_document" "nc" { - project = "nc" - collection = "my_collection" - document_id = "example_doc" - fields = jsonencode({foo = "bar"}) -} diff --git a/inputs/gcp/gdce/cluster/maintenance_policy/plan.json b/inputs/gcp/gdce/cluster/maintenance_policy/plan.json deleted file mode 100644 index f50c517b2..000000000 Binary files a/inputs/gcp/gdce/cluster/maintenance_policy/plan.json and /dev/null differ diff --git a/inputs/gcp/gdce/cluster/target_version/plan.json b/inputs/gcp/gdce/cluster/target_version/plan.json deleted file mode 100644 index e35c388e8..000000000 Binary files a/inputs/gcp/gdce/cluster/target_version/plan.json and /dev/null differ diff --git a/inputs/gcp/gdce/node_pool/basic_checks/plan.json b/inputs/gcp/gdce/node_pool/basic_checks/plan.json deleted file mode 100644 index 37e222a35..000000000 Binary files a/inputs/gcp/gdce/node_pool/basic_checks/plan.json and /dev/null differ diff --git a/inputs/gcp/gdce/node_pool/disk_encryption/plan.json b/inputs/gcp/gdce/node_pool/disk_encryption/plan.json deleted file mode 100644 index 9fd2a908f..000000000 Binary files a/inputs/gcp/gdce/node_pool/disk_encryption/plan.json and /dev/null differ diff --git a/inputs/gcp/gdce/vpn_connection/vpc/plan.json b/inputs/gcp/gdce/vpn_connection/vpc/plan.json deleted file mode 100644 index b73293a30..000000000 Binary files a/inputs/gcp/gdce/vpn_connection/vpc/plan.json and /dev/null differ diff --git a/inputs/gcp/gemini/google_gemini_code_repository_index/disable_force_destroy/plan.json b/inputs/gcp/gemini/google_gemini_code_repository_index/disable_force_destroy/plan.json deleted file mode 100644 index 400e96d79..000000000 Binary files a/inputs/gcp/gemini/google_gemini_code_repository_index/disable_force_destroy/plan.json and /dev/null differ diff --git a/inputs/gcp/gemini/google_gemini_code_repository_index/location/plan.json b/inputs/gcp/gemini/google_gemini_code_repository_index/location/plan.json deleted file mode 100644 index 4cca971ca..000000000 Binary files a/inputs/gcp/gemini/google_gemini_code_repository_index/location/plan.json and /dev/null differ diff --git a/inputs/gcp/gemini/google_gemini_code_repository_index/use_org_kms_key/plan.json b/inputs/gcp/gemini/google_gemini_code_repository_index/use_org_kms_key/plan.json deleted file mode 100644 index ffdcf87d8..000000000 Binary files a/inputs/gcp/gemini/google_gemini_code_repository_index/use_org_kms_key/plan.json and /dev/null differ diff --git a/inputs/gcp/gemini/google_gemini_data_sharing_with_google_setting/disable_data_sharing_ga/c.tf b/inputs/gcp/gemini/google_gemini_data_sharing_with_google_setting/disable_data_sharing_ga/c.tf index 6865951f9..37fb1dd47 100644 --- a/inputs/gcp/gemini/google_gemini_data_sharing_with_google_setting/disable_data_sharing_ga/c.tf +++ b/inputs/gcp/gemini/google_gemini_data_sharing_with_google_setting/disable_data_sharing_ga/c.tf @@ -2,5 +2,5 @@ resource "google_gemini_data_sharing_with_google_setting" "c"{ data_sharing_with_google_setting_id = "c" project = "PDE" location = "australia-southeast2" - enable_data_sharing = true + enable_data_sharing = false } \ No newline at end of file diff --git a/inputs/gcp/gemini/google_gemini_data_sharing_with_google_setting/disable_data_sharing_ga/nc.tf b/inputs/gcp/gemini/google_gemini_data_sharing_with_google_setting/disable_data_sharing_ga/nc.tf index 81e473eac..e1716940c 100644 --- a/inputs/gcp/gemini/google_gemini_data_sharing_with_google_setting/disable_data_sharing_ga/nc.tf +++ b/inputs/gcp/gemini/google_gemini_data_sharing_with_google_setting/disable_data_sharing_ga/nc.tf @@ -2,5 +2,5 @@ resource "google_gemini_data_sharing_with_google_setting" "nc"{ data_sharing_with_google_setting_id = "nc" project = "PDE" location = "asia-south1" - enable_data_sharing = false + enable_data_sharing = true } diff --git a/inputs/gcp/gemini/google_gemini_data_sharing_with_google_setting/disable_preview_data_sharing/plan.json b/inputs/gcp/gemini/google_gemini_data_sharing_with_google_setting/disable_preview_data_sharing/plan.json deleted file mode 100644 index e1b8e52ea..000000000 Binary files a/inputs/gcp/gemini/google_gemini_data_sharing_with_google_setting/disable_preview_data_sharing/plan.json and /dev/null differ diff --git a/inputs/gcp/gemini/google_gemini_gemini_gcp_enablement_setting/disable_customer_data_sharing/plan.json b/inputs/gcp/gemini/google_gemini_gemini_gcp_enablement_setting/disable_customer_data_sharing/plan.json deleted file mode 100644 index 719668479..000000000 Binary files a/inputs/gcp/gemini/google_gemini_gemini_gcp_enablement_setting/disable_customer_data_sharing/plan.json and /dev/null differ diff --git a/inputs/gcp/gemini/google_gemini_gemini_gcp_enablement_setting/force_enterprise_web_grounding/plan.json b/inputs/gcp/gemini/google_gemini_gemini_gcp_enablement_setting/force_enterprise_web_grounding/plan.json deleted file mode 100644 index 90142c889..000000000 Binary files a/inputs/gcp/gemini/google_gemini_gemini_gcp_enablement_setting/force_enterprise_web_grounding/plan.json and /dev/null differ diff --git a/inputs/gcp/gemini/google_gemini_logging_setting/force_log_metadata/plan.json b/inputs/gcp/gemini/google_gemini_logging_setting/force_log_metadata/plan.json deleted file mode 100644 index 4a172c286..000000000 Binary files a/inputs/gcp/gemini/google_gemini_logging_setting/force_log_metadata/plan.json and /dev/null differ diff --git a/inputs/gcp/gemini/google_gemini_logging_setting/force_log_prompts_responses/plan.json b/inputs/gcp/gemini/google_gemini_logging_setting/force_log_prompts_responses/plan.json deleted file mode 100644 index 54bb8612a..000000000 Binary files a/inputs/gcp/gemini/google_gemini_logging_setting/force_log_prompts_responses/plan.json and /dev/null differ diff --git a/inputs/gcp/gemini/google_gemini_release_channel_setting/force_stable_channel/plan.json b/inputs/gcp/gemini/google_gemini_release_channel_setting/force_stable_channel/plan.json deleted file mode 100644 index e6e633e87..000000000 Binary files a/inputs/gcp/gemini/google_gemini_release_channel_setting/force_stable_channel/plan.json and /dev/null differ diff --git a/inputs/gcp/google_kms/google_kms_crypto_key/complaint_purpose/plan.json b/inputs/gcp/google_kms/google_kms_crypto_key/complaint_purpose/plan.json deleted file mode 100644 index 1b6ba6a7d..000000000 --- a/inputs/gcp/google_kms/google_kms_crypto_key/complaint_purpose/plan.json +++ /dev/null @@ -1 +0,0 @@ -{"format_version":"1.2","terraform_version":"1.11.3","planned_values":{"root_module":{"resources":[{"address":"google_kms_crypto_key.c1","mode":"managed","type":"google_kms_crypto_key","name":"c1","provider_name":"registry.terraform.io/hashicorp/google","schema_version":1,"values":{"effective_labels":{"goog-terraform-provisioned":"true"},"key_ring":"example-key-ring","labels":null,"name":"c1","purpose":"ENCRYPT_DECRYPT","rotation_period":"100000s","skip_initial_version_creation":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"sensitive_values":{"effective_labels":{},"primary":[],"terraform_labels":{},"version_template":[]}},{"address":"google_kms_crypto_key.nc1","mode":"managed","type":"google_kms_crypto_key","name":"nc1","provider_name":"registry.terraform.io/hashicorp/google","schema_version":1,"values":{"effective_labels":{"goog-terraform-provisioned":"true"},"key_ring":"example-key-ring","labels":null,"name":"nc1","purpose":"ASYMMETRIC_DECRYPT","rotation_period":"100000s","skip_initial_version_creation":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"sensitive_values":{"effective_labels":{},"primary":[],"terraform_labels":{},"version_template":[]}},{"address":"google_kms_crypto_key.nc2","mode":"managed","type":"google_kms_crypto_key","name":"nc2","provider_name":"registry.terraform.io/hashicorp/google","schema_version":1,"values":{"effective_labels":{"goog-terraform-provisioned":"true"},"key_ring":"example-key-ring","labels":null,"name":"nc2","purpose":"ASYMMETRIC_DECRYPT","rotation_period":null,"skip_initial_version_creation":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"sensitive_values":{"effective_labels":{},"primary":[],"terraform_labels":{},"version_template":[]}}]}},"resource_changes":[{"address":"google_kms_crypto_key.c1","mode":"managed","type":"google_kms_crypto_key","name":"c1","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"effective_labels":{"goog-terraform-provisioned":"true"},"key_ring":"example-key-ring","labels":null,"name":"c1","purpose":"ENCRYPT_DECRYPT","rotation_period":"100000s","skip_initial_version_creation":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"after_unknown":{"crypto_key_backend":true,"destroy_scheduled_duration":true,"effective_labels":{},"id":true,"import_only":true,"primary":true,"terraform_labels":{},"version_template":true},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"primary":[],"terraform_labels":{},"version_template":[]}}},{"address":"google_kms_crypto_key.nc1","mode":"managed","type":"google_kms_crypto_key","name":"nc1","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"effective_labels":{"goog-terraform-provisioned":"true"},"key_ring":"example-key-ring","labels":null,"name":"nc1","purpose":"ASYMMETRIC_DECRYPT","rotation_period":"100000s","skip_initial_version_creation":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"after_unknown":{"crypto_key_backend":true,"destroy_scheduled_duration":true,"effective_labels":{},"id":true,"import_only":true,"primary":true,"terraform_labels":{},"version_template":true},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"primary":[],"terraform_labels":{},"version_template":[]}}},{"address":"google_kms_crypto_key.nc2","mode":"managed","type":"google_kms_crypto_key","name":"nc2","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"effective_labels":{"goog-terraform-provisioned":"true"},"key_ring":"example-key-ring","labels":null,"name":"nc2","purpose":"ASYMMETRIC_DECRYPT","rotation_period":null,"skip_initial_version_creation":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"after_unknown":{"crypto_key_backend":true,"destroy_scheduled_duration":true,"effective_labels":{},"id":true,"import_only":true,"primary":true,"terraform_labels":{},"version_template":true},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"primary":[],"terraform_labels":{},"version_template":[]}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_kms_crypto_key.c1","mode":"managed","type":"google_kms_crypto_key","name":"c1","provider_config_key":"google","expressions":{"key_ring":{"constant_value":"example-key-ring"},"name":{"constant_value":"c1"},"purpose":{"constant_value":"ENCRYPT_DECRYPT"},"rotation_period":{"constant_value":"100000s"}},"schema_version":1},{"address":"google_kms_crypto_key.nc1","mode":"managed","type":"google_kms_crypto_key","name":"nc1","provider_config_key":"google","expressions":{"key_ring":{"constant_value":"example-key-ring"},"name":{"constant_value":"nc1"},"purpose":{"constant_value":"ASYMMETRIC_DECRYPT"},"rotation_period":{"constant_value":"100000s"}},"schema_version":1},{"address":"google_kms_crypto_key.nc2","mode":"managed","type":"google_kms_crypto_key","name":"nc2","provider_config_key":"google","expressions":{"key_ring":{"constant_value":"example-key-ring"},"name":{"constant_value":"nc2"},"purpose":{"constant_value":"ASYMMETRIC_DECRYPT"}},"schema_version":1}]}},"timestamp":"2025-09-15T13:26:22Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/google_kms/google_kms_crypto_key/scheduled_destroy_duration/plan.json b/inputs/gcp/google_kms/google_kms_crypto_key/scheduled_destroy_duration/plan.json deleted file mode 100644 index 304136e62..000000000 --- a/inputs/gcp/google_kms/google_kms_crypto_key/scheduled_destroy_duration/plan.json +++ /dev/null @@ -1 +0,0 @@ -{"format_version":"1.2","terraform_version":"1.11.3","planned_values":{"root_module":{"resources":[{"address":"google_kms_crypto_key.c1","mode":"managed","type":"google_kms_crypto_key","name":"c1","provider_name":"registry.terraform.io/hashicorp/google","schema_version":1,"values":{"destroy_scheduled_duration":"2592000s","effective_labels":{"goog-terraform-provisioned":"true"},"key_ring":"example-key-ring","labels":null,"name":"c1","purpose":"ENCRYPT_DECRYPT","rotation_period":null,"skip_initial_version_creation":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"sensitive_values":{"effective_labels":{},"primary":[],"terraform_labels":{},"version_template":[]}},{"address":"google_kms_crypto_key.nc1","mode":"managed","type":"google_kms_crypto_key","name":"nc1","provider_name":"registry.terraform.io/hashicorp/google","schema_version":1,"values":{"destroy_scheduled_duration":"604800s","effective_labels":{"goog-terraform-provisioned":"true"},"key_ring":"example-key-ring","labels":null,"name":"nc1","purpose":"ENCRYPT_DECRYPT","rotation_period":null,"skip_initial_version_creation":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"sensitive_values":{"effective_labels":{},"primary":[],"terraform_labels":{},"version_template":[]}}]}},"resource_changes":[{"address":"google_kms_crypto_key.c1","mode":"managed","type":"google_kms_crypto_key","name":"c1","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"destroy_scheduled_duration":"2592000s","effective_labels":{"goog-terraform-provisioned":"true"},"key_ring":"example-key-ring","labels":null,"name":"c1","purpose":"ENCRYPT_DECRYPT","rotation_period":null,"skip_initial_version_creation":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"after_unknown":{"crypto_key_backend":true,"effective_labels":{},"id":true,"import_only":true,"primary":true,"terraform_labels":{},"version_template":true},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"primary":[],"terraform_labels":{},"version_template":[]}}},{"address":"google_kms_crypto_key.nc1","mode":"managed","type":"google_kms_crypto_key","name":"nc1","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"destroy_scheduled_duration":"604800s","effective_labels":{"goog-terraform-provisioned":"true"},"key_ring":"example-key-ring","labels":null,"name":"nc1","purpose":"ENCRYPT_DECRYPT","rotation_period":null,"skip_initial_version_creation":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"after_unknown":{"crypto_key_backend":true,"effective_labels":{},"id":true,"import_only":true,"primary":true,"terraform_labels":{},"version_template":true},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"primary":[],"terraform_labels":{},"version_template":[]}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google","version_constraint":"6.8.0"}},"root_module":{"resources":[{"address":"google_kms_crypto_key.c1","mode":"managed","type":"google_kms_crypto_key","name":"c1","provider_config_key":"google","expressions":{"destroy_scheduled_duration":{"constant_value":"2592000s"},"key_ring":{"constant_value":"example-key-ring"},"name":{"constant_value":"c1"},"purpose":{"constant_value":"ENCRYPT_DECRYPT"}},"schema_version":1},{"address":"google_kms_crypto_key.nc1","mode":"managed","type":"google_kms_crypto_key","name":"nc1","provider_config_key":"google","expressions":{"destroy_scheduled_duration":{"constant_value":"604800s"},"key_ring":{"constant_value":"example-key-ring"},"name":{"constant_value":"nc1"},"purpose":{"constant_value":"ENCRYPT_DECRYPT"}},"schema_version":1}]}},"timestamp":"2025-09-15T13:26:32Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/google_kms/google_kms_crypto_key/scheduled_rotation_period/plan.json b/inputs/gcp/google_kms/google_kms_crypto_key/scheduled_rotation_period/plan.json deleted file mode 100644 index 59242b710..000000000 --- a/inputs/gcp/google_kms/google_kms_crypto_key/scheduled_rotation_period/plan.json +++ /dev/null @@ -1 +0,0 @@ -{"format_version":"1.2","terraform_version":"1.11.3","planned_values":{"root_module":{"resources":[{"address":"google_kms_crypto_key.c1","mode":"managed","type":"google_kms_crypto_key","name":"c1","provider_name":"registry.terraform.io/hashicorp/google","schema_version":1,"values":{"effective_labels":{"goog-terraform-provisioned":"true"},"key_ring":"example-key-ring","labels":null,"name":"c1","purpose":"ENCRYPT_DECRYPT","rotation_period":"2592000s","skip_initial_version_creation":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"sensitive_values":{"effective_labels":{},"primary":[],"terraform_labels":{},"version_template":[]}},{"address":"google_kms_crypto_key.nc1","mode":"managed","type":"google_kms_crypto_key","name":"nc1","provider_name":"registry.terraform.io/hashicorp/google","schema_version":1,"values":{"effective_labels":{"goog-terraform-provisioned":"true"},"key_ring":"example-key-ring","labels":null,"name":"nc1","purpose":"ENCRYPT_DECRYPT","rotation_period":"100000s","skip_initial_version_creation":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"sensitive_values":{"effective_labels":{},"primary":[],"terraform_labels":{},"version_template":[]}},{"address":"google_kms_crypto_key.nc2","mode":"managed","type":"google_kms_crypto_key","name":"nc2","provider_name":"registry.terraform.io/hashicorp/google","schema_version":1,"values":{"effective_labels":{"env":"prod","goog-terraform-provisioned":"true","signing":"true"},"key_ring":"example-key-ring","labels":{"env":"prod","signing":"true"},"name":"nc2","purpose":"ASYMMETRIC_SIGN","rotation_period":"604800s","skip_initial_version_creation":null,"terraform_labels":{"env":"prod","goog-terraform-provisioned":"true","signing":"true"},"timeouts":null},"sensitive_values":{"effective_labels":{},"labels":{},"primary":[],"terraform_labels":{},"version_template":[]}}]}},"resource_changes":[{"address":"google_kms_crypto_key.c1","mode":"managed","type":"google_kms_crypto_key","name":"c1","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"effective_labels":{"goog-terraform-provisioned":"true"},"key_ring":"example-key-ring","labels":null,"name":"c1","purpose":"ENCRYPT_DECRYPT","rotation_period":"2592000s","skip_initial_version_creation":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"after_unknown":{"crypto_key_backend":true,"destroy_scheduled_duration":true,"effective_labels":{},"id":true,"import_only":true,"primary":true,"terraform_labels":{},"version_template":true},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"primary":[],"terraform_labels":{},"version_template":[]}}},{"address":"google_kms_crypto_key.nc1","mode":"managed","type":"google_kms_crypto_key","name":"nc1","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"effective_labels":{"goog-terraform-provisioned":"true"},"key_ring":"example-key-ring","labels":null,"name":"nc1","purpose":"ENCRYPT_DECRYPT","rotation_period":"100000s","skip_initial_version_creation":null,"terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"after_unknown":{"crypto_key_backend":true,"destroy_scheduled_duration":true,"effective_labels":{},"id":true,"import_only":true,"primary":true,"terraform_labels":{},"version_template":true},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"primary":[],"terraform_labels":{},"version_template":[]}}},{"address":"google_kms_crypto_key.nc2","mode":"managed","type":"google_kms_crypto_key","name":"nc2","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"effective_labels":{"env":"prod","goog-terraform-provisioned":"true","signing":"true"},"key_ring":"example-key-ring","labels":{"env":"prod","signing":"true"},"name":"nc2","purpose":"ASYMMETRIC_SIGN","rotation_period":"604800s","skip_initial_version_creation":null,"terraform_labels":{"env":"prod","goog-terraform-provisioned":"true","signing":"true"},"timeouts":null},"after_unknown":{"crypto_key_backend":true,"destroy_scheduled_duration":true,"effective_labels":{},"id":true,"import_only":true,"labels":{},"primary":true,"terraform_labels":{},"version_template":true},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"labels":{},"primary":[],"terraform_labels":{},"version_template":[]}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google","version_constraint":"6.8.0"}},"root_module":{"resources":[{"address":"google_kms_crypto_key.c1","mode":"managed","type":"google_kms_crypto_key","name":"c1","provider_config_key":"google","expressions":{"key_ring":{"constant_value":"example-key-ring"},"name":{"constant_value":"c1"},"purpose":{"constant_value":"ENCRYPT_DECRYPT"},"rotation_period":{"constant_value":"2592000s"}},"schema_version":1},{"address":"google_kms_crypto_key.nc1","mode":"managed","type":"google_kms_crypto_key","name":"nc1","provider_config_key":"google","expressions":{"key_ring":{"constant_value":"example-key-ring"},"name":{"constant_value":"nc1"},"purpose":{"constant_value":"ENCRYPT_DECRYPT"},"rotation_period":{"constant_value":"100000s"}},"schema_version":1},{"address":"google_kms_crypto_key.nc2","mode":"managed","type":"google_kms_crypto_key","name":"nc2","provider_config_key":"google","expressions":{"key_ring":{"constant_value":"example-key-ring"},"labels":{"constant_value":{"env":"prod","signing":"true"}},"name":{"constant_value":"nc2"},"purpose":{"constant_value":"ASYMMETRIC_SIGN"},"rotation_period":{"constant_value":"604800s"}},"schema_version":1}]}},"timestamp":"2025-09-15T13:26:44Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/google_kms/google_kms_crypto_key_iam_binding/approved_role/plan.json b/inputs/gcp/google_kms/google_kms_crypto_key_iam_binding/approved_role/plan.json deleted file mode 100644 index 2541327c6..000000000 --- a/inputs/gcp/google_kms/google_kms_crypto_key_iam_binding/approved_role/plan.json +++ /dev/null @@ -1 +0,0 @@ -{"format_version":"1.2","terraform_version":"1.11.3","planned_values":{"root_module":{"resources":[{"address":"google_kms_crypto_key_iam_binding.c1","mode":"managed","type":"google_kms_crypto_key_iam_binding","name":"c1","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"condition":[],"crypto_key_id":"c1","members":["serviceAccount:admin-user@example.com"],"role":"roles/cloudkms.cryptoKeyEncrypterDecrypter"},"sensitive_values":{"condition":[],"members":[false]}},{"address":"google_kms_crypto_key_iam_binding.nc1","mode":"managed","type":"google_kms_crypto_key_iam_binding","name":"nc1","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"condition":[],"crypto_key_id":"nc1","members":["user:admin-user@example.com"],"role":"roles/owner"},"sensitive_values":{"condition":[],"members":[false]}},{"address":"google_kms_crypto_key_iam_binding.nc2","mode":"managed","type":"google_kms_crypto_key_iam_binding","name":"nc2","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"condition":[],"crypto_key_id":"nc2","members":["user:admin-user@example.com"],"role":"roles/cloudkms.admin"},"sensitive_values":{"condition":[],"members":[false]}}]}},"resource_changes":[{"address":"google_kms_crypto_key_iam_binding.c1","mode":"managed","type":"google_kms_crypto_key_iam_binding","name":"c1","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"condition":[],"crypto_key_id":"c1","members":["serviceAccount:admin-user@example.com"],"role":"roles/cloudkms.cryptoKeyEncrypterDecrypter"},"after_unknown":{"condition":[],"etag":true,"id":true,"members":[false]},"before_sensitive":false,"after_sensitive":{"condition":[],"members":[false]}}},{"address":"google_kms_crypto_key_iam_binding.nc1","mode":"managed","type":"google_kms_crypto_key_iam_binding","name":"nc1","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"condition":[],"crypto_key_id":"nc1","members":["user:admin-user@example.com"],"role":"roles/owner"},"after_unknown":{"condition":[],"etag":true,"id":true,"members":[false]},"before_sensitive":false,"after_sensitive":{"condition":[],"members":[false]}}},{"address":"google_kms_crypto_key_iam_binding.nc2","mode":"managed","type":"google_kms_crypto_key_iam_binding","name":"nc2","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"condition":[],"crypto_key_id":"nc2","members":["user:admin-user@example.com"],"role":"roles/cloudkms.admin"},"after_unknown":{"condition":[],"etag":true,"id":true,"members":[false]},"before_sensitive":false,"after_sensitive":{"condition":[],"members":[false]}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google","version_constraint":"6.8.0"}},"root_module":{"resources":[{"address":"google_kms_crypto_key_iam_binding.c1","mode":"managed","type":"google_kms_crypto_key_iam_binding","name":"c1","provider_config_key":"google","expressions":{"crypto_key_id":{"constant_value":"c1"},"members":{"constant_value":["serviceAccount:admin-user@example.com"]},"role":{"constant_value":"roles/cloudkms.cryptoKeyEncrypterDecrypter"}},"schema_version":0},{"address":"google_kms_crypto_key_iam_binding.nc1","mode":"managed","type":"google_kms_crypto_key_iam_binding","name":"nc1","provider_config_key":"google","expressions":{"crypto_key_id":{"constant_value":"nc1"},"members":{"constant_value":["user:admin-user@example.com"]},"role":{"constant_value":"roles/owner"}},"schema_version":0},{"address":"google_kms_crypto_key_iam_binding.nc2","mode":"managed","type":"google_kms_crypto_key_iam_binding","name":"nc2","provider_config_key":"google","expressions":{"crypto_key_id":{"constant_value":"nc2"},"members":{"constant_value":["user:admin-user@example.com"]},"role":{"constant_value":"roles/cloudkms.admin"}},"schema_version":0}]}},"timestamp":"2025-09-15T13:26:55Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/google_kms/google_kms_crypto_key_version/state_allowed/plan.json b/inputs/gcp/google_kms/google_kms_crypto_key_version/state_allowed/plan.json deleted file mode 100644 index f1b01bc7c..000000000 --- a/inputs/gcp/google_kms/google_kms_crypto_key_version/state_allowed/plan.json +++ /dev/null @@ -1 +0,0 @@ -{"format_version":"1.2","terraform_version":"1.11.3","planned_values":{"root_module":{"resources":[{"address":"google_kms_crypto_key_version.c1","mode":"managed","type":"google_kms_crypto_key_version","name":"c1","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"crypto_key":"c1","external_protection_level_options":[],"state":"ENABLED","timeouts":null},"sensitive_values":{"attestation":[],"external_protection_level_options":[]}},{"address":"google_kms_crypto_key_version.nc1","mode":"managed","type":"google_kms_crypto_key_version","name":"nc1","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"crypto_key":"nc1","external_protection_level_options":[],"state":"DISABLED","timeouts":null},"sensitive_values":{"attestation":[],"external_protection_level_options":[]}}]}},"resource_changes":[{"address":"google_kms_crypto_key_version.c1","mode":"managed","type":"google_kms_crypto_key_version","name":"c1","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"crypto_key":"c1","external_protection_level_options":[],"state":"ENABLED","timeouts":null},"after_unknown":{"algorithm":true,"attestation":true,"external_protection_level_options":[],"generate_time":true,"id":true,"name":true,"protection_level":true},"before_sensitive":false,"after_sensitive":{"attestation":[],"external_protection_level_options":[]}}},{"address":"google_kms_crypto_key_version.nc1","mode":"managed","type":"google_kms_crypto_key_version","name":"nc1","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"crypto_key":"nc1","external_protection_level_options":[],"state":"DISABLED","timeouts":null},"after_unknown":{"algorithm":true,"attestation":true,"external_protection_level_options":[],"generate_time":true,"id":true,"name":true,"protection_level":true},"before_sensitive":false,"after_sensitive":{"attestation":[],"external_protection_level_options":[]}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google","version_constraint":"6.8.0"}},"root_module":{"resources":[{"address":"google_kms_crypto_key_version.c1","mode":"managed","type":"google_kms_crypto_key_version","name":"c1","provider_config_key":"google","expressions":{"crypto_key":{"constant_value":"c1"},"state":{"constant_value":"ENABLED"}},"schema_version":0},{"address":"google_kms_crypto_key_version.nc1","mode":"managed","type":"google_kms_crypto_key_version","name":"nc1","provider_config_key":"google","expressions":{"crypto_key":{"constant_value":"nc1"},"state":{"constant_value":"DISABLED"}},"schema_version":0}]}},"timestamp":"2025-09-15T13:27:06Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/google_kms/google_kms_ekm_connection/approved_location/plan.json b/inputs/gcp/google_kms/google_kms_ekm_connection/approved_location/plan.json deleted file mode 100644 index ef162a82c..000000000 --- a/inputs/gcp/google_kms/google_kms_ekm_connection/approved_location/plan.json +++ /dev/null @@ -1 +0,0 @@ -{"format_version":"1.2","terraform_version":"1.11.3","planned_values":{"root_module":{"resources":[{"address":"google_kms_ekm_connection.c1","mode":"managed","type":"google_kms_ekm_connection","name":"c1","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"key_management_mode":"MANUAL","location":"australia-southeast1","name":"c1","project":"my-project","service_resolvers":[{"hostname":"ekm-au.trusted.example.com","server_certificates":[{"raw_der":"dummy"}],"service_directory_service":"projects/my-project/locations/australia-southeast1/namespaces/ns/services/svc"}],"timeouts":null},"sensitive_values":{"service_resolvers":[{"server_certificates":[{"subject_alternative_dns_names":[]}]}]}},{"address":"google_kms_ekm_connection.nc1","mode":"managed","type":"google_kms_ekm_connection","name":"nc1","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"key_management_mode":"MANUAL","location":"us-central1","name":"nc1","project":"my-project","service_resolvers":[{"hostname":"malicious.example.com","server_certificates":[{"raw_der":"dummy"}],"service_directory_service":"projects/my-project/locations/us-central1/namespaces/ns/services/svc"}],"timeouts":null},"sensitive_values":{"service_resolvers":[{"server_certificates":[{"subject_alternative_dns_names":[]}]}]}},{"address":"google_kms_ekm_connection.nc2","mode":"managed","type":"google_kms_ekm_connection","name":"nc2","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"key_management_mode":"MANUAL","location":"australia-southeast1","name":"nc2","project":"my-project","service_resolvers":[{"hostname":"malicious.example.com","server_certificates":[{"raw_der":"dummy"}],"service_directory_service":"projects/my-project/locations/us-central1/namespaces/ns/services/svc"}],"timeouts":null},"sensitive_values":{"service_resolvers":[{"server_certificates":[{"subject_alternative_dns_names":[]}]}]}}]}},"resource_changes":[{"address":"google_kms_ekm_connection.c1","mode":"managed","type":"google_kms_ekm_connection","name":"c1","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"key_management_mode":"MANUAL","location":"australia-southeast1","name":"c1","project":"my-project","service_resolvers":[{"hostname":"ekm-au.trusted.example.com","server_certificates":[{"raw_der":"dummy"}],"service_directory_service":"projects/my-project/locations/australia-southeast1/namespaces/ns/services/svc"}],"timeouts":null},"after_unknown":{"create_time":true,"crypto_space_path":true,"etag":true,"id":true,"service_resolvers":[{"endpoint_filter":true,"server_certificates":[{"issuer":true,"not_after_time":true,"not_before_time":true,"parsed":true,"serial_number":true,"sha256_fingerprint":true,"subject":true,"subject_alternative_dns_names":true}]}]},"before_sensitive":false,"after_sensitive":{"service_resolvers":[{"server_certificates":[{"subject_alternative_dns_names":[]}]}]}}},{"address":"google_kms_ekm_connection.nc1","mode":"managed","type":"google_kms_ekm_connection","name":"nc1","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"key_management_mode":"MANUAL","location":"us-central1","name":"nc1","project":"my-project","service_resolvers":[{"hostname":"malicious.example.com","server_certificates":[{"raw_der":"dummy"}],"service_directory_service":"projects/my-project/locations/us-central1/namespaces/ns/services/svc"}],"timeouts":null},"after_unknown":{"create_time":true,"crypto_space_path":true,"etag":true,"id":true,"service_resolvers":[{"endpoint_filter":true,"server_certificates":[{"issuer":true,"not_after_time":true,"not_before_time":true,"parsed":true,"serial_number":true,"sha256_fingerprint":true,"subject":true,"subject_alternative_dns_names":true}]}]},"before_sensitive":false,"after_sensitive":{"service_resolvers":[{"server_certificates":[{"subject_alternative_dns_names":[]}]}]}}},{"address":"google_kms_ekm_connection.nc2","mode":"managed","type":"google_kms_ekm_connection","name":"nc2","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"key_management_mode":"MANUAL","location":"australia-southeast1","name":"nc2","project":"my-project","service_resolvers":[{"hostname":"malicious.example.com","server_certificates":[{"raw_der":"dummy"}],"service_directory_service":"projects/my-project/locations/us-central1/namespaces/ns/services/svc"}],"timeouts":null},"after_unknown":{"create_time":true,"crypto_space_path":true,"etag":true,"id":true,"service_resolvers":[{"endpoint_filter":true,"server_certificates":[{"issuer":true,"not_after_time":true,"not_before_time":true,"parsed":true,"serial_number":true,"sha256_fingerprint":true,"subject":true,"subject_alternative_dns_names":true}]}]},"before_sensitive":false,"after_sensitive":{"service_resolvers":[{"server_certificates":[{"subject_alternative_dns_names":[]}]}]}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google","expressions":{"project":{"constant_value":"my-project"}}}},"root_module":{"resources":[{"address":"google_kms_ekm_connection.c1","mode":"managed","type":"google_kms_ekm_connection","name":"c1","provider_config_key":"google","expressions":{"key_management_mode":{"constant_value":"MANUAL"},"location":{"constant_value":"australia-southeast1"},"name":{"constant_value":"c1"},"service_resolvers":[{"hostname":{"constant_value":"ekm-au.trusted.example.com"},"server_certificates":[{"raw_der":{"constant_value":"dummy"}}],"service_directory_service":{"constant_value":"projects/my-project/locations/australia-southeast1/namespaces/ns/services/svc"}}]},"schema_version":0},{"address":"google_kms_ekm_connection.nc1","mode":"managed","type":"google_kms_ekm_connection","name":"nc1","provider_config_key":"google","expressions":{"key_management_mode":{"constant_value":"MANUAL"},"location":{"constant_value":"us-central1"},"name":{"constant_value":"nc1"},"service_resolvers":[{"hostname":{"constant_value":"malicious.example.com"},"server_certificates":[{"raw_der":{"constant_value":"dummy"}}],"service_directory_service":{"constant_value":"projects/my-project/locations/us-central1/namespaces/ns/services/svc"}}]},"schema_version":0},{"address":"google_kms_ekm_connection.nc2","mode":"managed","type":"google_kms_ekm_connection","name":"nc2","provider_config_key":"google","expressions":{"key_management_mode":{"constant_value":"MANUAL"},"location":{"constant_value":"australia-southeast1"},"name":{"constant_value":"nc2"},"service_resolvers":[{"hostname":{"constant_value":"malicious.example.com"},"server_certificates":[{"raw_der":{"constant_value":"dummy"}}],"service_directory_service":{"constant_value":"projects/my-project/locations/us-central1/namespaces/ns/services/svc"}}]},"schema_version":0}]}},"timestamp":"2025-09-15T13:27:18Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/google_kms/google_kms_ekm_connection/cert_hostname_match/plan.json b/inputs/gcp/google_kms/google_kms_ekm_connection/cert_hostname_match/plan.json deleted file mode 100644 index 479b8ea69..000000000 --- a/inputs/gcp/google_kms/google_kms_ekm_connection/cert_hostname_match/plan.json +++ /dev/null @@ -1 +0,0 @@ -{"format_version":"1.2","terraform_version":"1.11.3","planned_values":{"root_module":{"resources":[{"address":"google_kms_ekm_connection.c1","mode":"managed","type":"google_kms_ekm_connection","name":"c1","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"key_management_mode":"MANUAL","location":"australia-southeast1","name":"c1","project":"my-project","service_resolvers":[{"hostname":"ekm-au.trusted.example.com","server_certificates":[{"raw_der":"AU_CERT_ABC"}],"service_directory_service":"projects/my-project/locations/australia-southeast1/namespaces/ns/services/svc"}],"timeouts":null},"sensitive_values":{"service_resolvers":[{"server_certificates":[{"subject_alternative_dns_names":[]}]}]}},{"address":"google_kms_ekm_connection.c2","mode":"managed","type":"google_kms_ekm_connection","name":"c2","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"key_management_mode":"MANUAL","location":"europe-west1","name":"c2","project":"my-project","service_resolvers":[{"hostname":"ekm-eu.trusted.example.com","server_certificates":[{"raw_der":"EU_CERT_DEF"}],"service_directory_service":"projects/my-project/locations/europe-west1/namespaces/ns/services/svc"}],"timeouts":null},"sensitive_values":{"service_resolvers":[{"server_certificates":[{"subject_alternative_dns_names":[]}]}]}},{"address":"google_kms_ekm_connection.nc1","mode":"managed","type":"google_kms_ekm_connection","name":"nc1","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"key_management_mode":"MANUAL","location":"australia-southeast1","name":"nc1","project":"my-project","service_resolvers":[{"hostname":"malicious.example.com","server_certificates":[{"raw_der":"AU_CERT_ABC"}],"service_directory_service":"projects/my-project/locations/australia-southeast1/namespaces/ns/services/svc"}],"timeouts":null},"sensitive_values":{"service_resolvers":[{"server_certificates":[{"subject_alternative_dns_names":[]}]}]}},{"address":"google_kms_ekm_connection.nc2","mode":"managed","type":"google_kms_ekm_connection","name":"nc2","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"key_management_mode":"MANUAL","location":"australia-southeast1","name":"nc2","project":"my-project","service_resolvers":[{"hostname":"ekm-au.trusted.example.com","server_certificates":[{"raw_der":"BAD_CERT_999"}],"service_directory_service":"projects/my-project/locations/australia-southeast1/namespaces/ns/services/svc"}],"timeouts":null},"sensitive_values":{"service_resolvers":[{"server_certificates":[{"subject_alternative_dns_names":[]}]}]}}]}},"resource_changes":[{"address":"google_kms_ekm_connection.c1","mode":"managed","type":"google_kms_ekm_connection","name":"c1","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"key_management_mode":"MANUAL","location":"australia-southeast1","name":"c1","project":"my-project","service_resolvers":[{"hostname":"ekm-au.trusted.example.com","server_certificates":[{"raw_der":"AU_CERT_ABC"}],"service_directory_service":"projects/my-project/locations/australia-southeast1/namespaces/ns/services/svc"}],"timeouts":null},"after_unknown":{"create_time":true,"crypto_space_path":true,"etag":true,"id":true,"service_resolvers":[{"endpoint_filter":true,"server_certificates":[{"issuer":true,"not_after_time":true,"not_before_time":true,"parsed":true,"serial_number":true,"sha256_fingerprint":true,"subject":true,"subject_alternative_dns_names":true}]}]},"before_sensitive":false,"after_sensitive":{"service_resolvers":[{"server_certificates":[{"subject_alternative_dns_names":[]}]}]}}},{"address":"google_kms_ekm_connection.c2","mode":"managed","type":"google_kms_ekm_connection","name":"c2","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"key_management_mode":"MANUAL","location":"europe-west1","name":"c2","project":"my-project","service_resolvers":[{"hostname":"ekm-eu.trusted.example.com","server_certificates":[{"raw_der":"EU_CERT_DEF"}],"service_directory_service":"projects/my-project/locations/europe-west1/namespaces/ns/services/svc"}],"timeouts":null},"after_unknown":{"create_time":true,"crypto_space_path":true,"etag":true,"id":true,"service_resolvers":[{"endpoint_filter":true,"server_certificates":[{"issuer":true,"not_after_time":true,"not_before_time":true,"parsed":true,"serial_number":true,"sha256_fingerprint":true,"subject":true,"subject_alternative_dns_names":true}]}]},"before_sensitive":false,"after_sensitive":{"service_resolvers":[{"server_certificates":[{"subject_alternative_dns_names":[]}]}]}}},{"address":"google_kms_ekm_connection.nc1","mode":"managed","type":"google_kms_ekm_connection","name":"nc1","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"key_management_mode":"MANUAL","location":"australia-southeast1","name":"nc1","project":"my-project","service_resolvers":[{"hostname":"malicious.example.com","server_certificates":[{"raw_der":"AU_CERT_ABC"}],"service_directory_service":"projects/my-project/locations/australia-southeast1/namespaces/ns/services/svc"}],"timeouts":null},"after_unknown":{"create_time":true,"crypto_space_path":true,"etag":true,"id":true,"service_resolvers":[{"endpoint_filter":true,"server_certificates":[{"issuer":true,"not_after_time":true,"not_before_time":true,"parsed":true,"serial_number":true,"sha256_fingerprint":true,"subject":true,"subject_alternative_dns_names":true}]}]},"before_sensitive":false,"after_sensitive":{"service_resolvers":[{"server_certificates":[{"subject_alternative_dns_names":[]}]}]}}},{"address":"google_kms_ekm_connection.nc2","mode":"managed","type":"google_kms_ekm_connection","name":"nc2","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"key_management_mode":"MANUAL","location":"australia-southeast1","name":"nc2","project":"my-project","service_resolvers":[{"hostname":"ekm-au.trusted.example.com","server_certificates":[{"raw_der":"BAD_CERT_999"}],"service_directory_service":"projects/my-project/locations/australia-southeast1/namespaces/ns/services/svc"}],"timeouts":null},"after_unknown":{"create_time":true,"crypto_space_path":true,"etag":true,"id":true,"service_resolvers":[{"endpoint_filter":true,"server_certificates":[{"issuer":true,"not_after_time":true,"not_before_time":true,"parsed":true,"serial_number":true,"sha256_fingerprint":true,"subject":true,"subject_alternative_dns_names":true}]}]},"before_sensitive":false,"after_sensitive":{"service_resolvers":[{"server_certificates":[{"subject_alternative_dns_names":[]}]}]}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google","expressions":{"project":{"constant_value":"my-project"}}}},"root_module":{"resources":[{"address":"google_kms_ekm_connection.c1","mode":"managed","type":"google_kms_ekm_connection","name":"c1","provider_config_key":"google","expressions":{"key_management_mode":{"constant_value":"MANUAL"},"location":{"constant_value":"australia-southeast1"},"name":{"constant_value":"c1"},"service_resolvers":[{"hostname":{"constant_value":"ekm-au.trusted.example.com"},"server_certificates":[{"raw_der":{"constant_value":"AU_CERT_ABC"}}],"service_directory_service":{"constant_value":"projects/my-project/locations/australia-southeast1/namespaces/ns/services/svc"}}]},"schema_version":0},{"address":"google_kms_ekm_connection.c2","mode":"managed","type":"google_kms_ekm_connection","name":"c2","provider_config_key":"google","expressions":{"key_management_mode":{"constant_value":"MANUAL"},"location":{"constant_value":"europe-west1"},"name":{"constant_value":"c2"},"service_resolvers":[{"hostname":{"constant_value":"ekm-eu.trusted.example.com"},"server_certificates":[{"raw_der":{"constant_value":"EU_CERT_DEF"}}],"service_directory_service":{"constant_value":"projects/my-project/locations/europe-west1/namespaces/ns/services/svc"}}]},"schema_version":0},{"address":"google_kms_ekm_connection.nc1","mode":"managed","type":"google_kms_ekm_connection","name":"nc1","provider_config_key":"google","expressions":{"key_management_mode":{"constant_value":"MANUAL"},"location":{"constant_value":"australia-southeast1"},"name":{"constant_value":"nc1"},"service_resolvers":[{"hostname":{"constant_value":"malicious.example.com"},"server_certificates":[{"raw_der":{"constant_value":"AU_CERT_ABC"}}],"service_directory_service":{"constant_value":"projects/my-project/locations/australia-southeast1/namespaces/ns/services/svc"}}]},"schema_version":0},{"address":"google_kms_ekm_connection.nc2","mode":"managed","type":"google_kms_ekm_connection","name":"nc2","provider_config_key":"google","expressions":{"key_management_mode":{"constant_value":"MANUAL"},"location":{"constant_value":"australia-southeast1"},"name":{"constant_value":"nc2"},"service_resolvers":[{"hostname":{"constant_value":"ekm-au.trusted.example.com"},"server_certificates":[{"raw_der":{"constant_value":"BAD_CERT_999"}}],"service_directory_service":{"constant_value":"projects/my-project/locations/australia-southeast1/namespaces/ns/services/svc"}}]},"schema_version":0}]}},"timestamp":"2025-09-15T13:27:32Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/google_kms/google_kms_key_handle/approved_location/plan.json b/inputs/gcp/google_kms/google_kms_key_handle/approved_location/plan.json deleted file mode 100644 index 983ba2cd0..000000000 --- a/inputs/gcp/google_kms/google_kms_key_handle/approved_location/plan.json +++ /dev/null @@ -1 +0,0 @@ -{"format_version":"1.2","terraform_version":"1.11.3","planned_values":{"root_module":{"resources":[{"address":"google_kms_key_handle.c1","mode":"managed","type":"google_kms_key_handle","name":"c1","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"location":"australia-east1","name":"c1","project":"google_project.resource_project.project_id","resource_type_selector":"storage.googleapis.com/Bucket","timeouts":null},"sensitive_values":{}},{"address":"google_kms_key_handle.nc1","mode":"managed","type":"google_kms_key_handle","name":"nc1","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"location":"europe-east1","name":"nc1","project":"google_project.resource_project.project_id","resource_type_selector":"storage.googleapis.com/Bucket","timeouts":null},"sensitive_values":{}}]}},"resource_changes":[{"address":"google_kms_key_handle.c1","mode":"managed","type":"google_kms_key_handle","name":"c1","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"location":"australia-east1","name":"c1","project":"google_project.resource_project.project_id","resource_type_selector":"storage.googleapis.com/Bucket","timeouts":null},"after_unknown":{"id":true,"kms_key":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"google_kms_key_handle.nc1","mode":"managed","type":"google_kms_key_handle","name":"nc1","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"location":"europe-east1","name":"nc1","project":"google_project.resource_project.project_id","resource_type_selector":"storage.googleapis.com/Bucket","timeouts":null},"after_unknown":{"id":true,"kms_key":true},"before_sensitive":false,"after_sensitive":{}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"},"google-beta":{"name":"google-beta","full_name":"registry.terraform.io/hashicorp/google-beta"}},"root_module":{"resources":[{"address":"google_kms_key_handle.c1","mode":"managed","type":"google_kms_key_handle","name":"c1","provider_config_key":"google-beta","expressions":{"location":{"constant_value":"australia-east1"},"name":{"constant_value":"c1"},"project":{"constant_value":"google_project.resource_project.project_id"},"resource_type_selector":{"constant_value":"storage.googleapis.com/Bucket"}},"schema_version":0},{"address":"google_kms_key_handle.nc1","mode":"managed","type":"google_kms_key_handle","name":"nc1","provider_config_key":"google-beta","expressions":{"location":{"constant_value":"europe-east1"},"name":{"constant_value":"nc1"},"project":{"constant_value":"google_project.resource_project.project_id"},"resource_type_selector":{"constant_value":"storage.googleapis.com/Bucket"}},"schema_version":0}]}},"timestamp":"2025-09-15T13:27:48Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/google_kms/google_kms_key_handle/approved_resources/plan.json b/inputs/gcp/google_kms/google_kms_key_handle/approved_resources/plan.json deleted file mode 100644 index bae54d774..000000000 --- a/inputs/gcp/google_kms/google_kms_key_handle/approved_resources/plan.json +++ /dev/null @@ -1 +0,0 @@ -{"format_version":"1.2","terraform_version":"1.11.3","planned_values":{"root_module":{"resources":[{"address":"google_kms_key_handle.c1","mode":"managed","type":"google_kms_key_handle","name":"c1","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"location":"australia-east1","name":"c1","project":"google_project.resource_project.project_id","resource_type_selector":"storage.googleapis.com/Bucket","timeouts":null},"sensitive_values":{}},{"address":"google_kms_key_handle.nc1","mode":"managed","type":"google_kms_key_handle","name":"nc1","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"location":"europe-east1","name":"nc1","project":"google_project.resource_project.project_id","resource_type_selector":"storage.googleapis.com/Disk","timeouts":null},"sensitive_values":{}},{"address":"google_kms_key_handle.nc2","mode":"managed","type":"google_kms_key_handle","name":"nc2","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"location":"europe-east1","name":"nc2","project":"google_project.resource_project.project_id","resource_type_selector":"sqladmin.googleapis.com/Instance","timeouts":null},"sensitive_values":{}}]}},"resource_changes":[{"address":"google_kms_key_handle.c1","mode":"managed","type":"google_kms_key_handle","name":"c1","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"location":"australia-east1","name":"c1","project":"google_project.resource_project.project_id","resource_type_selector":"storage.googleapis.com/Bucket","timeouts":null},"after_unknown":{"id":true,"kms_key":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"google_kms_key_handle.nc1","mode":"managed","type":"google_kms_key_handle","name":"nc1","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"location":"europe-east1","name":"nc1","project":"google_project.resource_project.project_id","resource_type_selector":"storage.googleapis.com/Disk","timeouts":null},"after_unknown":{"id":true,"kms_key":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"google_kms_key_handle.nc2","mode":"managed","type":"google_kms_key_handle","name":"nc2","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"location":"europe-east1","name":"nc2","project":"google_project.resource_project.project_id","resource_type_selector":"sqladmin.googleapis.com/Instance","timeouts":null},"after_unknown":{"id":true,"kms_key":true},"before_sensitive":false,"after_sensitive":{}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"},"google-beta":{"name":"google-beta","full_name":"registry.terraform.io/hashicorp/google-beta"}},"root_module":{"resources":[{"address":"google_kms_key_handle.c1","mode":"managed","type":"google_kms_key_handle","name":"c1","provider_config_key":"google-beta","expressions":{"location":{"constant_value":"australia-east1"},"name":{"constant_value":"c1"},"project":{"constant_value":"google_project.resource_project.project_id"},"resource_type_selector":{"constant_value":"storage.googleapis.com/Bucket"}},"schema_version":0},{"address":"google_kms_key_handle.nc1","mode":"managed","type":"google_kms_key_handle","name":"nc1","provider_config_key":"google-beta","expressions":{"location":{"constant_value":"europe-east1"},"name":{"constant_value":"nc1"},"project":{"constant_value":"google_project.resource_project.project_id"},"resource_type_selector":{"constant_value":"storage.googleapis.com/Disk"}},"schema_version":0},{"address":"google_kms_key_handle.nc2","mode":"managed","type":"google_kms_key_handle","name":"nc2","provider_config_key":"google-beta","expressions":{"location":{"constant_value":"europe-east1"},"name":{"constant_value":"nc2"},"project":{"constant_value":"google_project.resource_project.project_id"},"resource_type_selector":{"constant_value":"sqladmin.googleapis.com/Instance"}},"schema_version":0}]}},"timestamp":"2025-09-15T13:28:04Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/google_kms/google_kms_key_ring/allowed_location/plan.json b/inputs/gcp/google_kms/google_kms_key_ring/allowed_location/plan.json deleted file mode 100644 index 89094acdb..000000000 --- a/inputs/gcp/google_kms/google_kms_key_ring/allowed_location/plan.json +++ /dev/null @@ -1 +0,0 @@ -{"format_version":"1.2","terraform_version":"1.11.3","planned_values":{"root_module":{"resources":[{"address":"google_kms_key_ring.c1","mode":"managed","type":"google_kms_key_ring","name":"c1","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"location":"australia-southeast1","name":"c1","project":"your-project-id","timeouts":null},"sensitive_values":{}},{"address":"google_kms_key_ring.nc1","mode":"managed","type":"google_kms_key_ring","name":"nc1","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"location":"europe-west1","name":"nc1","project":"your-project-id","timeouts":null},"sensitive_values":{}}]}},"resource_changes":[{"address":"google_kms_key_ring.c1","mode":"managed","type":"google_kms_key_ring","name":"c1","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"location":"australia-southeast1","name":"c1","project":"your-project-id","timeouts":null},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"google_kms_key_ring.nc1","mode":"managed","type":"google_kms_key_ring","name":"nc1","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"location":"europe-west1","name":"nc1","project":"your-project-id","timeouts":null},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google","version_constraint":"6.8.0"}},"root_module":{"resources":[{"address":"google_kms_key_ring.c1","mode":"managed","type":"google_kms_key_ring","name":"c1","provider_config_key":"google","expressions":{"location":{"constant_value":"australia-southeast1"},"name":{"constant_value":"c1"},"project":{"constant_value":"your-project-id"}},"schema_version":0},{"address":"google_kms_key_ring.nc1","mode":"managed","type":"google_kms_key_ring","name":"nc1","provider_config_key":"google","expressions":{"location":{"constant_value":"europe-west1"},"name":{"constant_value":"nc1"},"project":{"constant_value":"your-project-id"}},"schema_version":0}]}},"timestamp":"2025-09-15T13:28:17Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/google_kms/google_kms_key_ring_import_job/import_method/plan b/inputs/gcp/google_kms/google_kms_key_ring_import_job/import_method/plan deleted file mode 100644 index cd41da4a6..000000000 Binary files a/inputs/gcp/google_kms/google_kms_key_ring_import_job/import_method/plan and /dev/null differ diff --git a/inputs/gcp/google_kms/google_kms_key_ring_import_job/import_method/plan.json b/inputs/gcp/google_kms/google_kms_key_ring_import_job/import_method/plan.json deleted file mode 100644 index b5d13c0d8..000000000 --- a/inputs/gcp/google_kms/google_kms_key_ring_import_job/import_method/plan.json +++ /dev/null @@ -1 +0,0 @@ -{"format_version":"1.2","terraform_version":"1.11.3","planned_values":{"root_module":{"resources":[{"address":"google_kms_key_ring_import_job.c1","mode":"managed","type":"google_kms_key_ring_import_job","name":"c1","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"import_job_id":"c1","import_method":"RSA_OAEP_3072_SHA256_AES_256","key_ring":"projects/my-project/locations/global/keyRings/my-ring","protection_level":"HSM","timeouts":null},"sensitive_values":{"attestation":[],"public_key":[]}},{"address":"google_kms_key_ring_import_job.nc1","mode":"managed","type":"google_kms_key_ring_import_job","name":"nc1","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"import_job_id":"nc1","import_method":"RSA_OAEP_3072_SHA1_AES_256","key_ring":"projects/my-project/locations/global/keyRings/my-ring","protection_level":"SOFTWARE","timeouts":null},"sensitive_values":{"attestation":[],"public_key":[]}},{"address":"google_kms_key_ring_import_job.nc2","mode":"managed","type":"google_kms_key_ring_import_job","name":"nc2","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"import_job_id":"nc2","import_method":"RSA_OAEP_3072_SHA1_AES_256","key_ring":"projects/my-project/locations/global/keyRings/my-ring","protection_level":"EXTERNAL","timeouts":null},"sensitive_values":{"attestation":[],"public_key":[]}}]}},"resource_changes":[{"address":"google_kms_key_ring_import_job.c1","mode":"managed","type":"google_kms_key_ring_import_job","name":"c1","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"import_job_id":"c1","import_method":"RSA_OAEP_3072_SHA256_AES_256","key_ring":"projects/my-project/locations/global/keyRings/my-ring","protection_level":"HSM","timeouts":null},"after_unknown":{"attestation":true,"expire_time":true,"id":true,"name":true,"public_key":true,"state":true},"before_sensitive":false,"after_sensitive":{"attestation":[],"public_key":[]}}},{"address":"google_kms_key_ring_import_job.nc1","mode":"managed","type":"google_kms_key_ring_import_job","name":"nc1","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"import_job_id":"nc1","import_method":"RSA_OAEP_3072_SHA1_AES_256","key_ring":"projects/my-project/locations/global/keyRings/my-ring","protection_level":"SOFTWARE","timeouts":null},"after_unknown":{"attestation":true,"expire_time":true,"id":true,"name":true,"public_key":true,"state":true},"before_sensitive":false,"after_sensitive":{"attestation":[],"public_key":[]}}},{"address":"google_kms_key_ring_import_job.nc2","mode":"managed","type":"google_kms_key_ring_import_job","name":"nc2","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"import_job_id":"nc2","import_method":"RSA_OAEP_3072_SHA1_AES_256","key_ring":"projects/my-project/locations/global/keyRings/my-ring","protection_level":"EXTERNAL","timeouts":null},"after_unknown":{"attestation":true,"expire_time":true,"id":true,"name":true,"public_key":true,"state":true},"before_sensitive":false,"after_sensitive":{"attestation":[],"public_key":[]}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_kms_key_ring_import_job.c1","mode":"managed","type":"google_kms_key_ring_import_job","name":"c1","provider_config_key":"google","expressions":{"import_job_id":{"constant_value":"c1"},"import_method":{"constant_value":"RSA_OAEP_3072_SHA256_AES_256"},"key_ring":{"constant_value":"projects/my-project/locations/global/keyRings/my-ring"},"protection_level":{"constant_value":"HSM"}},"schema_version":0},{"address":"google_kms_key_ring_import_job.nc1","mode":"managed","type":"google_kms_key_ring_import_job","name":"nc1","provider_config_key":"google","expressions":{"import_job_id":{"constant_value":"nc1"},"import_method":{"constant_value":"RSA_OAEP_3072_SHA1_AES_256"},"key_ring":{"constant_value":"projects/my-project/locations/global/keyRings/my-ring"},"protection_level":{"constant_value":"SOFTWARE"}},"schema_version":0},{"address":"google_kms_key_ring_import_job.nc2","mode":"managed","type":"google_kms_key_ring_import_job","name":"nc2","provider_config_key":"google","expressions":{"import_job_id":{"constant_value":"nc2"},"import_method":{"constant_value":"RSA_OAEP_3072_SHA1_AES_256"},"key_ring":{"constant_value":"projects/my-project/locations/global/keyRings/my-ring"},"protection_level":{"constant_value":"EXTERNAL"}},"schema_version":0}]}},"timestamp":"2025-09-15T13:28:29Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/google_kms/google_kms_key_ring_import_job/protection_level/plan b/inputs/gcp/google_kms/google_kms_key_ring_import_job/protection_level/plan deleted file mode 100644 index 42e687b5c..000000000 Binary files a/inputs/gcp/google_kms/google_kms_key_ring_import_job/protection_level/plan and /dev/null differ diff --git a/inputs/gcp/google_kms/google_kms_key_ring_import_job/protection_level/plan.json b/inputs/gcp/google_kms/google_kms_key_ring_import_job/protection_level/plan.json deleted file mode 100644 index 3171eace9..000000000 --- a/inputs/gcp/google_kms/google_kms_key_ring_import_job/protection_level/plan.json +++ /dev/null @@ -1 +0,0 @@ -{"format_version":"1.2","terraform_version":"1.11.3","planned_values":{"root_module":{"resources":[{"address":"google_kms_key_ring_import_job.c1","mode":"managed","type":"google_kms_key_ring_import_job","name":"c1","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"import_job_id":"c1","import_method":"RSA_OAEP_4096_SHA256_AES_256","key_ring":"projects/my-project/locations/global/keyRings/my-ring","protection_level":"HSM","timeouts":null},"sensitive_values":{"attestation":[],"public_key":[]}},{"address":"google_kms_key_ring_import_job.nc1","mode":"managed","type":"google_kms_key_ring_import_job","name":"nc1","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"import_job_id":"nc1","import_method":"RSA_OAEP_4096_SHA256_AES_256","key_ring":"projects/my-project/locations/global/keyRings/my-ring","protection_level":"SOFTWARE","timeouts":null},"sensitive_values":{"attestation":[],"public_key":[]}},{"address":"google_kms_key_ring_import_job.nc2","mode":"managed","type":"google_kms_key_ring_import_job","name":"nc2","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"import_job_id":"nc2","import_method":"RSA_OAEP_4096_SHA256_AES_256","key_ring":"projects/my-project/locations/global/keyRings/my-ring","protection_level":"EXTERNAL","timeouts":null},"sensitive_values":{"attestation":[],"public_key":[]}}]}},"resource_changes":[{"address":"google_kms_key_ring_import_job.c1","mode":"managed","type":"google_kms_key_ring_import_job","name":"c1","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"import_job_id":"c1","import_method":"RSA_OAEP_4096_SHA256_AES_256","key_ring":"projects/my-project/locations/global/keyRings/my-ring","protection_level":"HSM","timeouts":null},"after_unknown":{"attestation":true,"expire_time":true,"id":true,"name":true,"public_key":true,"state":true},"before_sensitive":false,"after_sensitive":{"attestation":[],"public_key":[]}}},{"address":"google_kms_key_ring_import_job.nc1","mode":"managed","type":"google_kms_key_ring_import_job","name":"nc1","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"import_job_id":"nc1","import_method":"RSA_OAEP_4096_SHA256_AES_256","key_ring":"projects/my-project/locations/global/keyRings/my-ring","protection_level":"SOFTWARE","timeouts":null},"after_unknown":{"attestation":true,"expire_time":true,"id":true,"name":true,"public_key":true,"state":true},"before_sensitive":false,"after_sensitive":{"attestation":[],"public_key":[]}}},{"address":"google_kms_key_ring_import_job.nc2","mode":"managed","type":"google_kms_key_ring_import_job","name":"nc2","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"import_job_id":"nc2","import_method":"RSA_OAEP_4096_SHA256_AES_256","key_ring":"projects/my-project/locations/global/keyRings/my-ring","protection_level":"EXTERNAL","timeouts":null},"after_unknown":{"attestation":true,"expire_time":true,"id":true,"name":true,"public_key":true,"state":true},"before_sensitive":false,"after_sensitive":{"attestation":[],"public_key":[]}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_kms_key_ring_import_job.c1","mode":"managed","type":"google_kms_key_ring_import_job","name":"c1","provider_config_key":"google","expressions":{"import_job_id":{"constant_value":"c1"},"import_method":{"constant_value":"RSA_OAEP_4096_SHA256_AES_256"},"key_ring":{"constant_value":"projects/my-project/locations/global/keyRings/my-ring"},"protection_level":{"constant_value":"HSM"}},"schema_version":0},{"address":"google_kms_key_ring_import_job.nc1","mode":"managed","type":"google_kms_key_ring_import_job","name":"nc1","provider_config_key":"google","expressions":{"import_job_id":{"constant_value":"nc1"},"import_method":{"constant_value":"RSA_OAEP_4096_SHA256_AES_256"},"key_ring":{"constant_value":"projects/my-project/locations/global/keyRings/my-ring"},"protection_level":{"constant_value":"SOFTWARE"}},"schema_version":0},{"address":"google_kms_key_ring_import_job.nc2","mode":"managed","type":"google_kms_key_ring_import_job","name":"nc2","provider_config_key":"google","expressions":{"import_job_id":{"constant_value":"nc2"},"import_method":{"constant_value":"RSA_OAEP_4096_SHA256_AES_256"},"key_ring":{"constant_value":"projects/my-project/locations/global/keyRings/my-ring"},"protection_level":{"constant_value":"EXTERNAL"}},"schema_version":0}]}},"timestamp":"2025-09-15T13:28:41Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/google_kms/google_kms_secret_ciphertext/crypto_key/plan b/inputs/gcp/google_kms/google_kms_secret_ciphertext/crypto_key/plan deleted file mode 100644 index 79f719061..000000000 Binary files a/inputs/gcp/google_kms/google_kms_secret_ciphertext/crypto_key/plan and /dev/null differ diff --git a/inputs/gcp/google_kms/google_kms_secret_ciphertext/crypto_key/plan.json b/inputs/gcp/google_kms/google_kms_secret_ciphertext/crypto_key/plan.json deleted file mode 100644 index ccedc5f41..000000000 --- a/inputs/gcp/google_kms/google_kms_secret_ciphertext/crypto_key/plan.json +++ /dev/null @@ -1 +0,0 @@ -{"format_version":"1.2","terraform_version":"1.11.3","planned_values":{"root_module":{"resources":[{"address":"google_kms_secret_ciphertext.c1","mode":"managed","type":"google_kms_secret_ciphertext","name":"c1","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"additional_authenticated_data":null,"crypto_key":"projects/my-project/locations/australia-southeast1/keyRings/approvedRing/cryptoKeys/approvedKey","plaintext":"very-secret-data","timeouts":null},"sensitive_values":{"additional_authenticated_data":true,"plaintext":true}},{"address":"google_kms_secret_ciphertext.nc1","mode":"managed","type":"google_kms_secret_ciphertext","name":"nc1","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"additional_authenticated_data":null,"crypto_key":"projects/my-project/locations/us-central1/keyRings/approvedRing/cryptoKeys/approvedKey","plaintext":"very-secret-data","timeouts":null},"sensitive_values":{"additional_authenticated_data":true,"plaintext":true}}]}},"resource_changes":[{"address":"google_kms_secret_ciphertext.c1","mode":"managed","type":"google_kms_secret_ciphertext","name":"c1","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"additional_authenticated_data":null,"crypto_key":"projects/my-project/locations/australia-southeast1/keyRings/approvedRing/cryptoKeys/approvedKey","plaintext":"very-secret-data","timeouts":null},"after_unknown":{"ciphertext":true,"id":true},"before_sensitive":false,"after_sensitive":{"additional_authenticated_data":true,"plaintext":true}}},{"address":"google_kms_secret_ciphertext.nc1","mode":"managed","type":"google_kms_secret_ciphertext","name":"nc1","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"additional_authenticated_data":null,"crypto_key":"projects/my-project/locations/us-central1/keyRings/approvedRing/cryptoKeys/approvedKey","plaintext":"very-secret-data","timeouts":null},"after_unknown":{"ciphertext":true,"id":true},"before_sensitive":false,"after_sensitive":{"additional_authenticated_data":true,"plaintext":true}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google","version_constraint":"6.8.0"}},"root_module":{"resources":[{"address":"google_kms_secret_ciphertext.c1","mode":"managed","type":"google_kms_secret_ciphertext","name":"c1","provider_config_key":"google","expressions":{"crypto_key":{"constant_value":"projects/my-project/locations/australia-southeast1/keyRings/approvedRing/cryptoKeys/approvedKey"},"plaintext":{"constant_value":"very-secret-data"}},"schema_version":0},{"address":"google_kms_secret_ciphertext.nc1","mode":"managed","type":"google_kms_secret_ciphertext","name":"nc1","provider_config_key":"google","expressions":{"crypto_key":{"constant_value":"projects/my-project/locations/us-central1/keyRings/approvedRing/cryptoKeys/approvedKey"},"plaintext":{"constant_value":"very-secret-data"}},"schema_version":0}]}},"timestamp":"2025-09-15T13:28:53Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/looker/core/cmek_required/c.tf b/inputs/gcp/looker/core/cmek_required/c.tf index a7e1823f6..d593becc1 100644 --- a/inputs/gcp/looker/core/cmek_required/c.tf +++ b/inputs/gcp/looker/core/cmek_required/c.tf @@ -1,4 +1,4 @@ -resource "google_looker_instance" "c" { +resource "google_looker_instance" "c1" { name = "c1" project = var.project encryption_config { diff --git a/inputs/gcp/looker/core/cmek_required/nc.tf b/inputs/gcp/looker/core/cmek_required/nc.tf index ed903783f..4258dc3e3 100644 --- a/inputs/gcp/looker/core/cmek_required/nc.tf +++ b/inputs/gcp/looker/core/cmek_required/nc.tf @@ -1,5 +1,5 @@ resource "google_looker_instance" "nc" { - name = "nc1" + name = "nc" project = var.project # encryption_config intentionally omitted to trigger failure oauth_config { @@ -7,9 +7,3 @@ resource "google_looker_instance" "nc" { client_secret = "test-client-secret" } } - - - - - - diff --git a/inputs/gcp/looker/core/cmek_required/plan.json b/inputs/gcp/looker/core/cmek_required/plan.json deleted file mode 100644 index cd95f196a..000000000 Binary files a/inputs/gcp/looker/core/cmek_required/plan.json and /dev/null differ diff --git a/inputs/gcp/looker/core/cmek_required/variables.tf b/inputs/gcp/looker/core/cmek_required/variables.tf index cc7bcb49a..06bb753eb 100644 --- a/inputs/gcp/looker/core/cmek_required/variables.tf +++ b/inputs/gcp/looker/core/cmek_required/variables.tf @@ -1,3 +1,4 @@ -variable "project" { - type = string -} +variable "project" { + type = string + default = "reliable-alpha-478205-k9" +} \ No newline at end of file diff --git a/inputs/gcp/looker/core/consumer_network_set/c.tf b/inputs/gcp/looker/core/consumer_network_set/c.tf index 7139b0e1f..efc1b1c6a 100644 --- a/inputs/gcp/looker/core/consumer_network_set/c.tf +++ b/inputs/gcp/looker/core/consumer_network_set/c.tf @@ -1,4 +1,4 @@ -resource "google_looker_instance" "c" { +resource "google_looker_instance" "c1" { name = "c1" project = var.project consumer_network = "projects/test-project-123/global/networks/test-vpc" diff --git a/inputs/gcp/looker/core/consumer_network_set/nc.tf b/inputs/gcp/looker/core/consumer_network_set/nc.tf index d657d24c3..0f6f30d3d 100644 --- a/inputs/gcp/looker/core/consumer_network_set/nc.tf +++ b/inputs/gcp/looker/core/consumer_network_set/nc.tf @@ -1,5 +1,5 @@ resource "google_looker_instance" "nc" { - name = "nc1" + name = "nc" project = var.project # consumer_network intentionally omitted to trigger failure oauth_config { diff --git a/inputs/gcp/looker/core/consumer_network_set/plan.json b/inputs/gcp/looker/core/consumer_network_set/plan.json deleted file mode 100644 index 977b1d90f..000000000 Binary files a/inputs/gcp/looker/core/consumer_network_set/plan.json and /dev/null differ diff --git a/inputs/gcp/looker/core/consumer_network_set/variables.tf b/inputs/gcp/looker/core/consumer_network_set/variables.tf index cc7bcb49a..06bb753eb 100644 --- a/inputs/gcp/looker/core/consumer_network_set/variables.tf +++ b/inputs/gcp/looker/core/consumer_network_set/variables.tf @@ -1,3 +1,4 @@ -variable "project" { - type = string -} +variable "project" { + type = string + default = "reliable-alpha-478205-k9" +} \ No newline at end of file diff --git a/inputs/gcp/looker/core/custom_domain_when_private/c.tf b/inputs/gcp/looker/core/custom_domain_when_private/c.tf index 0297867a3..244f47fa6 100644 --- a/inputs/gcp/looker/core/custom_domain_when_private/c.tf +++ b/inputs/gcp/looker/core/custom_domain_when_private/c.tf @@ -1,4 +1,4 @@ -resource "google_looker_instance" "c" { +resource "google_looker_instance" "c1" { name = "c1" project = var.project public_ip_enabled = false diff --git a/inputs/gcp/looker/core/custom_domain_when_private/nc.tf b/inputs/gcp/looker/core/custom_domain_when_private/nc.tf index 891df7ab8..222bd839e 100644 --- a/inputs/gcp/looker/core/custom_domain_when_private/nc.tf +++ b/inputs/gcp/looker/core/custom_domain_when_private/nc.tf @@ -1,5 +1,5 @@ resource "google_looker_instance" "nc" { - name = "nc1" + name = "nc" project = var.project public_ip_enabled = false # custom_domain block intentionally omitted to trigger failure diff --git a/inputs/gcp/looker/core/custom_domain_when_private/plan.json b/inputs/gcp/looker/core/custom_domain_when_private/plan.json deleted file mode 100644 index ab93876dc..000000000 Binary files a/inputs/gcp/looker/core/custom_domain_when_private/plan.json and /dev/null differ diff --git a/inputs/gcp/looker/core/custom_domain_when_private/variables.tf b/inputs/gcp/looker/core/custom_domain_when_private/variables.tf index 47de7dcdb..06bb753eb 100644 --- a/inputs/gcp/looker/core/custom_domain_when_private/variables.tf +++ b/inputs/gcp/looker/core/custom_domain_when_private/variables.tf @@ -1,5 +1,4 @@ -variable "project" { - type = string -} - - +variable "project" { + type = string + default = "reliable-alpha-478205-k9" +} \ No newline at end of file diff --git a/inputs/gcp/looker/core/disallow_trial_editions/c.tf b/inputs/gcp/looker/core/disallow_trial_editions/c.tf index 0e7eeeb64..1e229d73f 100644 --- a/inputs/gcp/looker/core/disallow_trial_editions/c.tf +++ b/inputs/gcp/looker/core/disallow_trial_editions/c.tf @@ -1,7 +1,7 @@ # Compliant Looker Core instance with production platform edition # This resource is compliant because platform_edition is not a trial SKU -resource "google_looker_instance" "c" { +resource "google_looker_instance" "c1" { name = "c1" platform_edition = "LOOKER_CORE_STANDARD_ANNUAL" region = "us-central1" diff --git a/inputs/gcp/looker/core/disallow_trial_editions/nc.tf b/inputs/gcp/looker/core/disallow_trial_editions/nc.tf index 50c8d2e75..dfbd0c86c 100644 --- a/inputs/gcp/looker/core/disallow_trial_editions/nc.tf +++ b/inputs/gcp/looker/core/disallow_trial_editions/nc.tf @@ -1,5 +1,5 @@ resource "google_looker_instance" "nc" { - name = "nc1" + name = "nc" project = var.project platform_edition = "LOOKER_CORE_TRIAL" # Trial edition to trigger failure oauth_config { diff --git a/inputs/gcp/looker/core/disallow_trial_editions/plan.json b/inputs/gcp/looker/core/disallow_trial_editions/plan.json deleted file mode 100644 index d25150478..000000000 Binary files a/inputs/gcp/looker/core/disallow_trial_editions/plan.json and /dev/null differ diff --git a/inputs/gcp/looker/core/disallow_trial_editions/variables.tf b/inputs/gcp/looker/core/disallow_trial_editions/variables.tf index 40146ff78..87050d9ef 100644 --- a/inputs/gcp/looker/core/disallow_trial_editions/variables.tf +++ b/inputs/gcp/looker/core/disallow_trial_editions/variables.tf @@ -1,3 +1,4 @@ -variable "project" { - type = string +variable "project" { + type = string + default = "reliable-alpha-478205-k9" } diff --git a/inputs/gcp/looker/core/fips_required/c.tf b/inputs/gcp/looker/core/fips_required/c.tf index 618533ae9..2f6361bac 100644 --- a/inputs/gcp/looker/core/fips_required/c.tf +++ b/inputs/gcp/looker/core/fips_required/c.tf @@ -1,7 +1,7 @@ # Compliant Looker Core instance with FIPS enabled # This resource is compliant because fips_enabled is set to true -resource "google_looker_instance" "c" { +resource "google_looker_instance" "c1" { name = "c1" platform_edition = "LOOKER_CORE_STANDARD_ANNUAL" region = "us-central1" diff --git a/inputs/gcp/looker/core/fips_required/nc.tf b/inputs/gcp/looker/core/fips_required/nc.tf index 6e6afe14f..e8cd34688 100644 --- a/inputs/gcp/looker/core/fips_required/nc.tf +++ b/inputs/gcp/looker/core/fips_required/nc.tf @@ -1,5 +1,5 @@ resource "google_looker_instance" "nc" { - name = "nc1" + name = "nc" project = var.project fips_enabled = false # FIPS disabled to trigger failure oauth_config { diff --git a/inputs/gcp/looker/core/fips_required/plan.json b/inputs/gcp/looker/core/fips_required/plan.json deleted file mode 100644 index c9dcea3c8..000000000 Binary files a/inputs/gcp/looker/core/fips_required/plan.json and /dev/null differ diff --git a/inputs/gcp/looker/core/fips_required/variables.tf b/inputs/gcp/looker/core/fips_required/variables.tf index 40146ff78..93874fdec 100644 --- a/inputs/gcp/looker/core/fips_required/variables.tf +++ b/inputs/gcp/looker/core/fips_required/variables.tf @@ -1,3 +1,4 @@ -variable "project" { - type = string -} +variable "project" { + type = string + default = "reliable-alpha-478205-k9" +} \ No newline at end of file diff --git a/inputs/gcp/looker/core/maintenance_window_set/c.tf b/inputs/gcp/looker/core/maintenance_window_set/c.tf index 86215b5d2..9f4fb4b3a 100644 --- a/inputs/gcp/looker/core/maintenance_window_set/c.tf +++ b/inputs/gcp/looker/core/maintenance_window_set/c.tf @@ -1,4 +1,4 @@ -resource "google_looker_instance" "c" { +resource "google_looker_instance" "c1" { name = "c1" project = var.project maintenance_window { diff --git a/inputs/gcp/looker/core/maintenance_window_set/nc.tf b/inputs/gcp/looker/core/maintenance_window_set/nc.tf index 122f95560..bca677af9 100644 --- a/inputs/gcp/looker/core/maintenance_window_set/nc.tf +++ b/inputs/gcp/looker/core/maintenance_window_set/nc.tf @@ -1,5 +1,5 @@ resource "google_looker_instance" "nc" { - name = "nc1" + name = "nc" project = var.project # maintenance_window intentionally omitted to trigger failure oauth_config { diff --git a/inputs/gcp/looker/core/maintenance_window_set/plan.json b/inputs/gcp/looker/core/maintenance_window_set/plan.json deleted file mode 100644 index cc28ac15e..000000000 Binary files a/inputs/gcp/looker/core/maintenance_window_set/plan.json and /dev/null differ diff --git a/inputs/gcp/looker/core/maintenance_window_set/variables.tf b/inputs/gcp/looker/core/maintenance_window_set/variables.tf index 40146ff78..93874fdec 100644 --- a/inputs/gcp/looker/core/maintenance_window_set/variables.tf +++ b/inputs/gcp/looker/core/maintenance_window_set/variables.tf @@ -1,3 +1,4 @@ -variable "project" { - type = string -} +variable "project" { + type = string + default = "reliable-alpha-478205-k9" +} \ No newline at end of file diff --git a/inputs/gcp/looker/core/no_public_ip/c.tf b/inputs/gcp/looker/core/no_public_ip/c.tf index 1a3233842..318ad15ea 100644 --- a/inputs/gcp/looker/core/no_public_ip/c.tf +++ b/inputs/gcp/looker/core/no_public_ip/c.tf @@ -1,7 +1,7 @@ # Compliant Looker Core instance with public IP disabled # This resource is compliant because public_ip_enabled is set to false -resource "google_looker_instance" "c" { +resource "google_looker_instance" "c1" { name = "c1" platform_edition = "LOOKER_CORE_STANDARD_ANNUAL" region = "us-central1" diff --git a/inputs/gcp/looker/core/no_public_ip/nc.tf b/inputs/gcp/looker/core/no_public_ip/nc.tf index 2f073f190..34674112c 100644 --- a/inputs/gcp/looker/core/no_public_ip/nc.tf +++ b/inputs/gcp/looker/core/no_public_ip/nc.tf @@ -1,5 +1,5 @@ resource "google_looker_instance" "nc" { - name = "nc1" + name = "nc" project = var.project public_ip_enabled = true # Public IP enabled to trigger failure oauth_config { diff --git a/inputs/gcp/looker/core/no_public_ip/plan.json b/inputs/gcp/looker/core/no_public_ip/plan.json deleted file mode 100644 index 280f71d0a..000000000 Binary files a/inputs/gcp/looker/core/no_public_ip/plan.json and /dev/null differ diff --git a/inputs/gcp/looker/core/no_public_ip/variables.tf b/inputs/gcp/looker/core/no_public_ip/variables.tf index 40146ff78..93874fdec 100644 --- a/inputs/gcp/looker/core/no_public_ip/variables.tf +++ b/inputs/gcp/looker/core/no_public_ip/variables.tf @@ -1,3 +1,4 @@ -variable "project" { - type = string -} +variable "project" { + type = string + default = "reliable-alpha-478205-k9" +} \ No newline at end of file diff --git a/inputs/gcp/looker/core/oauth_config_present/c.tf b/inputs/gcp/looker/core/oauth_config_present/c.tf index fbd475ddd..d12fbdb92 100644 --- a/inputs/gcp/looker/core/oauth_config_present/c.tf +++ b/inputs/gcp/looker/core/oauth_config_present/c.tf @@ -1,4 +1,4 @@ -resource "google_looker_instance" "c" { +resource "google_looker_instance" "c1" { name = "c1" project = var.project oauth_config { diff --git a/inputs/gcp/looker/core/oauth_config_present/nc.tf b/inputs/gcp/looker/core/oauth_config_present/nc.tf index bfce1d932..ec890c048 100644 --- a/inputs/gcp/looker/core/oauth_config_present/nc.tf +++ b/inputs/gcp/looker/core/oauth_config_present/nc.tf @@ -1,5 +1,5 @@ resource "google_looker_instance" "nc" { - name = "nc1" + name = "nc" project = var.project oauth_config { client_id = "" # Empty client_id to trigger failure diff --git a/inputs/gcp/looker/core/oauth_config_present/plan.json b/inputs/gcp/looker/core/oauth_config_present/plan.json deleted file mode 100644 index 3a07460b6..000000000 Binary files a/inputs/gcp/looker/core/oauth_config_present/plan.json and /dev/null differ diff --git a/inputs/gcp/looker/core/oauth_config_present/variables.tf b/inputs/gcp/looker/core/oauth_config_present/variables.tf index 40146ff78..93874fdec 100644 --- a/inputs/gcp/looker/core/oauth_config_present/variables.tf +++ b/inputs/gcp/looker/core/oauth_config_present/variables.tf @@ -1,3 +1,4 @@ -variable "project" { - type = string -} +variable "project" { + type = string + default = "reliable-alpha-478205-k9" +} \ No newline at end of file diff --git a/inputs/gcp/looker/core/private_connectivity_required/c.tf b/inputs/gcp/looker/core/private_connectivity_required/c.tf index fcba82faf..fa454c2b5 100644 --- a/inputs/gcp/looker/core/private_connectivity_required/c.tf +++ b/inputs/gcp/looker/core/private_connectivity_required/c.tf @@ -1,7 +1,8 @@ -resource "google_looker_instance" "c" { +resource "google_looker_instance" "c1" { name = "c1" project = var.project public_ip_enabled = false + private_ip_enabled = true psc_enabled = true oauth_config { client_id = "test-client-id" diff --git a/inputs/gcp/looker/core/private_connectivity_required/nc.tf b/inputs/gcp/looker/core/private_connectivity_required/nc.tf index 73f7abfc7..b1b8bea35 100644 --- a/inputs/gcp/looker/core/private_connectivity_required/nc.tf +++ b/inputs/gcp/looker/core/private_connectivity_required/nc.tf @@ -1,5 +1,5 @@ resource "google_looker_instance" "nc" { - name = "nc1" + name = "nc" project = var.project public_ip_enabled = true # private_ip_enabled = false (default/omitted) diff --git a/inputs/gcp/looker/core/private_connectivity_required/plan.json b/inputs/gcp/looker/core/private_connectivity_required/plan.json deleted file mode 100644 index 97becd0ca..000000000 Binary files a/inputs/gcp/looker/core/private_connectivity_required/plan.json and /dev/null differ diff --git a/inputs/gcp/looker/core/private_connectivity_required/variables.tf b/inputs/gcp/looker/core/private_connectivity_required/variables.tf index 47de7dcdb..06bb753eb 100644 --- a/inputs/gcp/looker/core/private_connectivity_required/variables.tf +++ b/inputs/gcp/looker/core/private_connectivity_required/variables.tf @@ -1,5 +1,4 @@ -variable "project" { - type = string -} - - +variable "project" { + type = string + default = "reliable-alpha-478205-k9" +} \ No newline at end of file diff --git a/inputs/gcp/looker/core/psc_mode_hygiene/c.tf b/inputs/gcp/looker/core/psc_mode_hygiene/c.tf index d52f075ed..7b8994b33 100644 --- a/inputs/gcp/looker/core/psc_mode_hygiene/c.tf +++ b/inputs/gcp/looker/core/psc_mode_hygiene/c.tf @@ -1,4 +1,4 @@ -resource "google_looker_instance" "c" { +resource "google_looker_instance" "c1" { name = "c1" project = var.project psc_enabled = true diff --git a/inputs/gcp/looker/core/psc_mode_hygiene/nc.tf b/inputs/gcp/looker/core/psc_mode_hygiene/nc.tf index ce831b742..10a7b8046 100644 --- a/inputs/gcp/looker/core/psc_mode_hygiene/nc.tf +++ b/inputs/gcp/looker/core/psc_mode_hygiene/nc.tf @@ -1,5 +1,5 @@ resource "google_looker_instance" "nc" { - name = "nc1" + name = "nc" project = var.project psc_enabled = true public_ip_enabled = true # ← triggers Situation A diff --git a/inputs/gcp/looker/core/psc_mode_hygiene/plan.json b/inputs/gcp/looker/core/psc_mode_hygiene/plan.json deleted file mode 100644 index b2d1e7f52..000000000 Binary files a/inputs/gcp/looker/core/psc_mode_hygiene/plan.json and /dev/null differ diff --git a/inputs/gcp/looker/core/psc_mode_hygiene/variables.tf b/inputs/gcp/looker/core/psc_mode_hygiene/variables.tf index 47de7dcdb..06bb753eb 100644 --- a/inputs/gcp/looker/core/psc_mode_hygiene/variables.tf +++ b/inputs/gcp/looker/core/psc_mode_hygiene/variables.tf @@ -1,5 +1,4 @@ -variable "project" { - type = string -} - - +variable "project" { + type = string + default = "reliable-alpha-478205-k9" +} \ No newline at end of file diff --git a/inputs/gcp/looker/core/reserved_range_for_psa_psc/c.tf b/inputs/gcp/looker/core/reserved_range_for_psa_psc/c.tf index a53ebf805..c0eaa4c40 100644 --- a/inputs/gcp/looker/core/reserved_range_for_psa_psc/c.tf +++ b/inputs/gcp/looker/core/reserved_range_for_psa_psc/c.tf @@ -1,4 +1,4 @@ -resource "google_looker_instance" "c" { +resource "google_looker_instance" "c1" { name = "c1" project = var.project reserved_range = "projects/test-project-123/global/addresses/test-reserved-range" diff --git a/inputs/gcp/looker/core/reserved_range_for_psa_psc/nc.tf b/inputs/gcp/looker/core/reserved_range_for_psa_psc/nc.tf index a168de321..37a4abb74 100644 --- a/inputs/gcp/looker/core/reserved_range_for_psa_psc/nc.tf +++ b/inputs/gcp/looker/core/reserved_range_for_psa_psc/nc.tf @@ -1,5 +1,5 @@ resource "google_looker_instance" "nc" { - name = "nc1" + name = "nc" project = var.project # reserved_range intentionally omitted to trigger failure oauth_config { diff --git a/inputs/gcp/looker/core/reserved_range_for_psa_psc/plan.json b/inputs/gcp/looker/core/reserved_range_for_psa_psc/plan.json deleted file mode 100644 index 251889a32..000000000 Binary files a/inputs/gcp/looker/core/reserved_range_for_psa_psc/plan.json and /dev/null differ diff --git a/inputs/gcp/looker/core/reserved_range_for_psa_psc/variables.tf b/inputs/gcp/looker/core/reserved_range_for_psa_psc/variables.tf index 40146ff78..93874fdec 100644 --- a/inputs/gcp/looker/core/reserved_range_for_psa_psc/variables.tf +++ b/inputs/gcp/looker/core/reserved_range_for_psa_psc/variables.tf @@ -1,3 +1,4 @@ -variable "project" { - type = string -} +variable "project" { + type = string + default = "reliable-alpha-478205-k9" +} \ No newline at end of file diff --git a/inputs/gcp/lustre/lustre_instance/allowed_location/plan.json b/inputs/gcp/lustre/lustre_instance/allowed_location/plan.json deleted file mode 100644 index 61929c2d1..000000000 Binary files a/inputs/gcp/lustre/lustre_instance/allowed_location/plan.json and /dev/null differ diff --git a/inputs/gcp/lustre/lustre_instance/allowed_vpc_network/plan.json b/inputs/gcp/lustre/lustre_instance/allowed_vpc_network/plan.json deleted file mode 100644 index ed5a6f439..000000000 Binary files a/inputs/gcp/lustre/lustre_instance/allowed_vpc_network/plan.json and /dev/null differ diff --git a/inputs/gcp/lustre/lustre_instance/gke_support_enabled/plan.json b/inputs/gcp/lustre/lustre_instance/gke_support_enabled/plan.json deleted file mode 100644 index c238ec547..000000000 Binary files a/inputs/gcp/lustre/lustre_instance/gke_support_enabled/plan.json and /dev/null differ diff --git a/inputs/gcp/lustre/lustre_instance/valid_per_unit_storage_throughput/plan.json b/inputs/gcp/lustre/lustre_instance/valid_per_unit_storage_throughput/plan.json deleted file mode 100644 index 179c65335..000000000 Binary files a/inputs/gcp/lustre/lustre_instance/valid_per_unit_storage_throughput/plan.json and /dev/null differ diff --git a/inputs/gcp/managed_kafka/google_managed_kafka_acl/global_acls/nc.tf b/inputs/gcp/managed_kafka/google_managed_kafka_acl/global_acls/nc.tf index f6f3424d1..2d99a1c0c 100644 --- a/inputs/gcp/managed_kafka/google_managed_kafka_acl/global_acls/nc.tf +++ b/inputs/gcp/managed_kafka/google_managed_kafka_acl/global_acls/nc.tf @@ -2,8 +2,8 @@ # Keep "nc" as the name to indicate that this resource and its attributes are non-compliant resource "google_managed_kafka_acl" "nc1" { - acl_id = "nc1" - cluster = "projects/my-project/locations/australia-southeast2/clusters/example-cluster" + acl_id = "allTopics" + cluster = "nc1" location = "us-central1" project = "123" @@ -16,8 +16,8 @@ resource "google_managed_kafka_acl" "nc1" { } resource "google_managed_kafka_acl" "nc2" { - acl_id = "nc2" - cluster = "projects/my-project/locations/australia-southeast2/clusters/example-cluster" + acl_id = "allConsumerGroups" + cluster = "nc2" location = "us-central1" project = "123" diff --git a/inputs/gcp/managed_kafka/google_managed_kafka_acl/secured_acl_entries/c.tf b/inputs/gcp/managed_kafka/google_managed_kafka_acl/secured_acl_entries/c.tf index 1452ad81d..fbd19a5ff 100644 --- a/inputs/gcp/managed_kafka/google_managed_kafka_acl/secured_acl_entries/c.tf +++ b/inputs/gcp/managed_kafka/google_managed_kafka_acl/secured_acl_entries/c.tf @@ -1,9 +1,9 @@ resource "google_managed_kafka_acl" "c1" { acl_id = "c1" - cluster = "projects/my-project/locations/australia-southeast2/clusters/example-cluster" + cluster = "projects/my-project/locations/australia-southeast2/clusters/example-cluster" location = "us-central1" - project = "123" - + project = "123" + acl_entries { principal = "User:producer-client@my-project.iam.gserviceaccount.com" permission_type = "ALLOW" diff --git a/inputs/gcp/managed_kafka/google_managed_kafka_acl/secured_acl_entries/nc.tf b/inputs/gcp/managed_kafka/google_managed_kafka_acl/secured_acl_entries/nc.tf index 8bdddff09..1106d5b0d 100644 --- a/inputs/gcp/managed_kafka/google_managed_kafka_acl/secured_acl_entries/nc.tf +++ b/inputs/gcp/managed_kafka/google_managed_kafka_acl/secured_acl_entries/nc.tf @@ -1,12 +1,12 @@ resource "google_managed_kafka_acl" "nc1" { acl_id = "nc1" - cluster = "projects/my-project/locations/australia-southeast2/clusters/example-cluster" + cluster = "nc1" location = "us-central1" project = "123" acl_entries { principal = "User:producer-client@my-project.iam.gserviceaccount.com" - permission_type = "ALLOW" + permission_type = "DENY" operation = "ALL" host = "*" } diff --git a/inputs/gcp/managed_kafka/google_managed_kafka_acl/wildcard_principals/c.tf b/inputs/gcp/managed_kafka/google_managed_kafka_acl/wildcard_principals/c.tf index ac17b1c90..a6b6549e8 100644 --- a/inputs/gcp/managed_kafka/google_managed_kafka_acl/wildcard_principals/c.tf +++ b/inputs/gcp/managed_kafka/google_managed_kafka_acl/wildcard_principals/c.tf @@ -1,9 +1,9 @@ # Describe your resource type here # Keep "c" as the name to indicate that this resource and its attributes are compliant -resource "google_managed_kafka_acl" "compliant_acl" { +resource "google_managed_kafka_acl" "c" { acl_id = "compliant-acl" - cluster = "projects/my-project/locations/australia-southeast2/clusters/example-cluster" + cluster = "c" location = "us-central1" project = "123" diff --git a/inputs/gcp/managed_kafka/google_managed_kafka_acl/wildcard_principals/nc.tf b/inputs/gcp/managed_kafka/google_managed_kafka_acl/wildcard_principals/nc.tf index c51c2fb4b..b81477e0b 100644 --- a/inputs/gcp/managed_kafka/google_managed_kafka_acl/wildcard_principals/nc.tf +++ b/inputs/gcp/managed_kafka/google_managed_kafka_acl/wildcard_principals/nc.tf @@ -1,9 +1,9 @@ # Describe your resource type here # Keep "nc" as the name to indicate that this resource and its attributes are non-compliant -resource "google_managed_kafka_acl" "non_compliant_acl" { +resource "google_managed_kafka_acl" "nc" { acl_id = "non-compliant-acl" - cluster = "projects/my-project/locations/australia-southeast2/clusters/example-cluster" + cluster = "nc" location = "us-central1" project = "123" diff --git a/inputs/gcp/managed_kafka/google_managed_kafka_cluster/kafka_cluster/c.tf b/inputs/gcp/managed_kafka/google_managed_kafka_cluster/kafka_cluster/c.tf index de5f5e2de..8f2b92f9e 100644 --- a/inputs/gcp/managed_kafka/google_managed_kafka_cluster/kafka_cluster/c.tf +++ b/inputs/gcp/managed_kafka/google_managed_kafka_cluster/kafka_cluster/c.tf @@ -1,20 +1,20 @@ # Describe your resource type here # Keep "c" as the name to indicate that this resource and its attributes are compliant -resource "google_managed_kafka_cluster" "secure_cluster" { - cluster_id = "secure-cluster" +resource "google_managed_kafka_cluster" "c" { + cluster_id = "c" location = "us-central1" project = "my-project" capacity_config { - vcpu_count = 3 - memory_bytes = 3221225472 + vcpu_count = 2 + memory_bytes = 2147483650 } gcp_config { access_config { network_configs { - subnet = "projects/my-project/regions/us-central1/subnetworks/private-subnet" # ✅ Private subnet + subnet = "10.0.0.0/8" # ✅ Private subnet } } kms_key = google_kms_crypto_key.key.id diff --git a/inputs/gcp/managed_kafka/google_managed_kafka_cluster/kafka_cluster/nc.tf b/inputs/gcp/managed_kafka/google_managed_kafka_cluster/kafka_cluster/nc.tf index 555f619a9..87f6bab49 100644 --- a/inputs/gcp/managed_kafka/google_managed_kafka_cluster/kafka_cluster/nc.tf +++ b/inputs/gcp/managed_kafka/google_managed_kafka_cluster/kafka_cluster/nc.tf @@ -1,17 +1,17 @@ -resource "google_managed_kafka_cluster" "insecure_cluster" { - cluster_id = "insecure-cluster" +resource "google_managed_kafka_cluster" "nc" { + cluster_id = "nc" location = "us-central1" project = "my-project" capacity_config { - vcpu_count = 3 - memory_bytes = 3221225472 + vcpu_count = 4 + memory_bytes = 2147483350 } gcp_config { access_config { network_configs { - subnet = "" + subnet = "" } } diff --git a/inputs/gcp/managed_kafka/google_managed_kafka_cluster/kafka_cmek_enforcement/c.tf b/inputs/gcp/managed_kafka/google_managed_kafka_cluster/kafka_cmek_enforcement/c.tf index 8197c77dd..1686e2e03 100644 --- a/inputs/gcp/managed_kafka/google_managed_kafka_cluster/kafka_cmek_enforcement/c.tf +++ b/inputs/gcp/managed_kafka/google_managed_kafka_cluster/kafka_cmek_enforcement/c.tf @@ -1,5 +1,5 @@ -resource "google_managed_kafka_cluster" "secure_cluster" { - cluster_id = "secure-cluster" +resource "google_managed_kafka_cluster" "c" { + cluster_id = "c" location = "us-central1" project = "123" diff --git a/inputs/gcp/managed_kafka/google_managed_kafka_cluster/kafka_cmek_enforcement/nc.tf b/inputs/gcp/managed_kafka/google_managed_kafka_cluster/kafka_cmek_enforcement/nc.tf index f0dff4412..fcf0154f6 100644 --- a/inputs/gcp/managed_kafka/google_managed_kafka_cluster/kafka_cmek_enforcement/nc.tf +++ b/inputs/gcp/managed_kafka/google_managed_kafka_cluster/kafka_cmek_enforcement/nc.tf @@ -1,6 +1,6 @@ -resource "google_managed_kafka_cluster" "insecure_cluster" { - cluster_id = "insecure-cluster" - location = "us-central1" +resource "google_managed_kafka_cluster" "nc" { + cluster_id = "nc" + location = "us-central3" project = "123" capacity_config { diff --git a/inputs/gcp/managed_kafka/google_managed_kafka_cluster/kafka_mtls_enforcement/c.tf b/inputs/gcp/managed_kafka/google_managed_kafka_cluster/kafka_mtls_enforcement/c.tf index 2efef9956..c87225970 100644 --- a/inputs/gcp/managed_kafka/google_managed_kafka_cluster/kafka_mtls_enforcement/c.tf +++ b/inputs/gcp/managed_kafka/google_managed_kafka_cluster/kafka_mtls_enforcement/c.tf @@ -1,8 +1,8 @@ # Describe your resource type here # Keep "c" as the name to indicate that this resource and its attributes are compliant -resource "google_managed_kafka_cluster" "secure_tls_cluster" { - cluster_id = "secure-tls-cluster" +resource "google_managed_kafka_cluster" "c" { + cluster_id = "c" location = "us-central1" project = "123" diff --git a/inputs/gcp/managed_kafka/google_managed_kafka_cluster/kafka_mtls_enforcement/nc.tf b/inputs/gcp/managed_kafka/google_managed_kafka_cluster/kafka_mtls_enforcement/nc.tf index 8ce487ea6..e99c3c148 100644 --- a/inputs/gcp/managed_kafka/google_managed_kafka_cluster/kafka_mtls_enforcement/nc.tf +++ b/inputs/gcp/managed_kafka/google_managed_kafka_cluster/kafka_mtls_enforcement/nc.tf @@ -1,8 +1,8 @@ # Describe your resource type here # Keep "nc" as the name to indicate that this resource and its attributes are non-compliant -resource "google_managed_kafka_cluster" "insecure_tls_cluster" { - cluster_id = "insecure-tls-cluster" +resource "google_managed_kafka_cluster" "nc" { + cluster_id = "nc" location = "us-central1" project = "123" diff --git a/inputs/gcp/managed_kafka/google_managed_kafka_connect_cluster/cluster_binding/c.tf b/inputs/gcp/managed_kafka/google_managed_kafka_connect_cluster/cluster_binding/c.tf index d477bbac9..605a298ba 100644 --- a/inputs/gcp/managed_kafka/google_managed_kafka_connect_cluster/cluster_binding/c.tf +++ b/inputs/gcp/managed_kafka/google_managed_kafka_connect_cluster/cluster_binding/c.tf @@ -2,41 +2,10 @@ # Describe your resource type here # Keep "c" as the name to indicate that this resource and its attributes are compliant -resource "google_project" "project" { - project_id = "tf-test-compliant" - name = "tf-test-compliant" - org_id = "123456789" - billing_account = "000000-0000000-0000000-000000" - provider = google-beta -} - -resource "google_managed_kafka_cluster" "gmk_cluster" { - project = google_project.project.project_id - cluster_id = "my-cluster" - location = "us-central1" - - capacity_config { - vcpu_count = 3 - memory_bytes = 3221225472 - - } - - gcp_config { - access_config { - network_configs { - - subnet = "projects/${google_project.project.project_id}/regions/us-central1/subnetworks/default" - } - } - } - - provider = google-beta -} - resource "google_managed_kafka_connect_cluster" "c" { - project = google_project.project.project_id - connect_cluster_id = "compliant-connect-cluster" - kafka_cluster = "projects/${google_project.project.project_id}/locations/us-central1/clusters/${google_managed_kafka_cluster.gmk_cluster.cluster_id}" + project = "c" + connect_cluster_id = "cc" + kafka_cluster = "projects/c/locations/us-central1/clusters/cc" location = "us-central1" capacity_config { @@ -49,7 +18,7 @@ resource "google_managed_kafka_connect_cluster" "c" { access_config { network_configs { - primary_subnet = "projects/${google_project.project.project_id}/regions/us-central1/subnetworks/default" + primary_subnet = "projects/c/regions/us-central1/subnetworks/default" dns_domain_names = ["internal.managed.kafka"] } diff --git a/inputs/gcp/managed_kafka/google_managed_kafka_connect_cluster/cluster_binding/nc.tf b/inputs/gcp/managed_kafka/google_managed_kafka_connect_cluster/cluster_binding/nc.tf index 900e2b849..803c5bc56 100644 --- a/inputs/gcp/managed_kafka/google_managed_kafka_connect_cluster/cluster_binding/nc.tf +++ b/inputs/gcp/managed_kafka/google_managed_kafka_connect_cluster/cluster_binding/nc.tf @@ -1,47 +1,12 @@ -# Describe your resource type here -# Keep "nc" as the name to indicate that this resource and its attributes are non-compliant - - -resource "google_project" "project_nc" { - project_id = "tf-test-noncompliant" - name = "tf-test-noncompliant" - org_id = "123456789" - billing_account = "000000-0000000-0000000-000000" - provider = google-beta -} - -resource "google_managed_kafka_cluster" "gmk_cluster_nc" { - project = google_project.project_nc.project_id - cluster_id = "my-cluster" - location = "us-central1" - - capacity_config { - vcpu_count = 3 - memory_bytes = 3221225472 - - } - - gcp_config { - access_config { - network_configs { - - subnet = "projects/${google_project.project_nc.project_id}/regions/us-central1/subnetworks/default" - } - } - } - - provider = google-beta -} - resource "google_managed_kafka_connect_cluster" "nc" { - project = google_project.project_nc.project_id - connect_cluster_id = "noncompliant-connect-cluster" - kafka_cluster = "projects/${google_project.project_nc.project_id}/locations/us-central1/clusters/${google_managed_kafka_cluster.gmk_cluster_nc.cluster_id}" + project = "nc" + connect_cluster_id = "ncc" + kafka_cluster = "projects/nc/locations/us-central1/clusters/nc" location = "us-central1" capacity_config { - vcpu_count = 2 # ❌ Below min CPU - memory_bytes = 2147483648 # ❌ Below min memory + vcpu_count = 1 # ❌ Below min CPU + memory_bytes = 1073741824 # ❌ Below min memory } @@ -49,8 +14,8 @@ resource "google_managed_kafka_connect_cluster" "nc" { access_config { network_configs { - primary_subnet = "projects/${google_project.project_nc.project_id}/regions/us-central1/subnetworks/default" - dns_domain_names = ["${google_managed_kafka_cluster.gmk_cluster_nc.cluster_id}.us-central1.managedkafka.${google_project.project_nc.project_id}.cloud.goog"] # ❌ Public DNS + primary_subnet = "projects/nc/regions/us-central1/subnetworks/default" + dns_domain_names = ["nc.us-central1.managedkafka.nc.cloud.goog"] # ❌ Public DNS } } diff --git a/inputs/gcp/managed_kafka/google_managed_kafka_connect_cluster/disallow_public_exposure/c.tf b/inputs/gcp/managed_kafka/google_managed_kafka_connect_cluster/disallow_public_exposure/c.tf index a8a68701a..5caf98396 100644 --- a/inputs/gcp/managed_kafka/google_managed_kafka_connect_cluster/disallow_public_exposure/c.tf +++ b/inputs/gcp/managed_kafka/google_managed_kafka_connect_cluster/disallow_public_exposure/c.tf @@ -1,42 +1,11 @@ # Describe your resource type here # Keep "c" as the name to indicate that this resource and its attributes are compliant -# Compliant Project -resource "google_project" "project" { - project_id = "tf-test-compliant" - name = "tf-test-compliant" - org_id = "123456789" - billing_account = "000000-0000000-0000000-000000" - provider = google-beta -} - -# Compliant Kafka Cluster -resource "google_managed_kafka_cluster" "gmk_cluster" { - project = google_project.project.project_id - cluster_id = "compliant-kafka-cluster" - location = "us-central1" - - capacity_config { - vcpu_count = 3 - memory_bytes = 3221225472 - } - - gcp_config { - access_config { - network_configs { - subnet = "projects/${google_project.project.project_id}/regions/us-central1/subnetworks/private-subnet" - } - } - } - - provider = google-beta -} - # ✅ Compliant Kafka Connect Cluster (No public exposure) resource "google_managed_kafka_connect_cluster" "c" { - project = google_project.project.project_id - connect_cluster_id = "compliant-connect-cluster" - kafka_cluster = "projects/${google_project.project.project_id}/locations/us-central1/clusters/${google_managed_kafka_cluster.gmk_cluster.cluster_id}" + project = "c" + connect_cluster_id = "cc" + kafka_cluster = "projects/c/locations/us-central1/clusters/cc" location = "us-central1" capacity_config { @@ -47,7 +16,7 @@ resource "google_managed_kafka_connect_cluster" "c" { gcp_config { access_config { network_configs { - primary_subnet = "projects/${google_project.project.project_id}/regions/us-central1/subnetworks/private-subnet" + primary_subnet = "projects/c/regions/us-central1/subnetworks/private-subnet-1" } } diff --git a/inputs/gcp/managed_kafka/google_managed_kafka_connect_cluster/disallow_public_exposure/nc.tf b/inputs/gcp/managed_kafka/google_managed_kafka_connect_cluster/disallow_public_exposure/nc.tf index 2f3321af2..b0f02c13a 100644 --- a/inputs/gcp/managed_kafka/google_managed_kafka_connect_cluster/disallow_public_exposure/nc.tf +++ b/inputs/gcp/managed_kafka/google_managed_kafka_connect_cluster/disallow_public_exposure/nc.tf @@ -1,43 +1,11 @@ # Describe your resource type here # Keep "nc" as the name to indicate that this resource and its attributes are non-compliant - -# Non-Compliant Project -resource "google_project" "project_nc" { - project_id = "tf-test-noncompliant" - name = "tf-test-noncompliant" - org_id = "123456789" - billing_account = "000000-0000000-0000000-000000" - provider = google-beta -} - -# Non-Compliant Kafka Cluster -resource "google_managed_kafka_cluster" "gmk_cluster_nc" { - project = google_project.project_nc.project_id - cluster_id = "noncompliant-kafka-cluster" - location = "us-central1" - - capacity_config { - vcpu_count = 3 - memory_bytes = 3221225472 - } - - gcp_config { - access_config { - network_configs { - subnet = "projects/${google_project.project_nc.project_id}/regions/us-central1/subnetworks/default" - } - } - } - - provider = google-beta -} - # ❌ Non-Compliant Kafka Connect Cluster (Publicly exposed) resource "google_managed_kafka_connect_cluster" "nc" { - project = google_project.project_nc.project_id - connect_cluster_id = "noncompliant-connect-cluster" - kafka_cluster = "projects/${google_project.project_nc.project_id}/locations/us-central1/clusters/${google_managed_kafka_cluster.gmk_cluster_nc.cluster_id}" + project = "nc" + connect_cluster_id = "ncc" + kafka_cluster = "projects/nc/locations/us-central1/clusters/ncc" location = "us-central1" capacity_config { @@ -48,7 +16,7 @@ resource "google_managed_kafka_connect_cluster" "nc" { gcp_config { access_config { network_configs { - primary_subnet = "projects/${google_project.project_nc.project_id}/regions/us-central1/subnetworks/default" + primary_subnet = "projects/nc/regions/us-central1/subnetworks/public-subnet-1" } } diff --git a/inputs/gcp/managed_kafka/google_managed_kafka_connect_cluster/enforce_private_networking/.terraform.lock.hcl b/inputs/gcp/managed_kafka/google_managed_kafka_connect_cluster/enforce_private_networking/.terraform.lock.hcl deleted file mode 100644 index 111bf408c..000000000 --- a/inputs/gcp/managed_kafka/google_managed_kafka_connect_cluster/enforce_private_networking/.terraform.lock.hcl +++ /dev/null @@ -1,40 +0,0 @@ -# This file is maintained automatically by "terraform init". -# Manual edits may be lost in future updates. - -provider "registry.terraform.io/hashicorp/google" { - version = "7.2.0" - hashes = [ - "h1:n9j0rZHrmXEay4dYo0D+RGS7X8eQr+YZ0MupX8GaMfI=", - "zh:0f036e400c90ae45289b948afb49ca938d169fb4a31d7560b345fd0ae5121407", - "zh:28a7c683656178456dc7942f051df46052150cee74da7535e7ca8748a83baf30", - "zh:2994083c634cff44de626b4bfca3e5e8ed5b2a08baa6f4c4fa4b217d5f49559a", - "zh:3c0d98921944c39f2e9d7f42122f44bcf07418ee9ee5faf81e6357cecbac4870", - "zh:4f869f574ab7e5970e9ec543fccd4c773e41a111f9bedc7075b725217f3c6fd2", - "zh:65479468ab9f6735d267bb593af8d139561790467ba6f8f99c3ba3be25b3a8e9", - "zh:827cb00f8dc4bba03afce2ff5d11bcd2d0528fc4624ea05b70354a1fa18b59fb", - "zh:a087e5155bd73d59f9dc6df65c1b38944de06cb2a5ead2439b31ad10a18da5a7", - "zh:db714b0e7a4365b3d93c17df2abc2bc883c89b15524111433af05aea176680c1", - "zh:e5444fde901cfefe7f66c8e9a1d9915d403fc2a6ebe87eaa2a262d2a50ee0a10", - "zh:f360342aa2bad7f6123c959b2129abaed99e26891dcd0b0719fec55252bb44b9", - "zh:f569b65999264a9416862bca5cd2a6177d94ccb0424f3a4ef424428912b9cb3c", - ] -} - -provider "registry.terraform.io/hashicorp/google-beta" { - version = "7.2.0" - hashes = [ - "h1:rKj2i6jNLm1FEfEiX9VeUpHpZPsDinlPPROZvDWCJ8U=", - "zh:015d927e5f5a75ec7f15090c80e27bc5d03115508286de791bcc7fffc53e990a", - "zh:425837eba331c26d967dc7831094a482da12cfaa5807ace5c5540c716ebf19ff", - "zh:435cfc975297a64681f3371b4ffe19f90e2914e4b64f9f8f592edc8bdf161d5d", - "zh:66b2b2dfca7c82d1473915bb4a4db24e4a4583ddc74060f58a50ba8c3c3847fe", - "zh:7bfe3adcb900ec20e254f7ea1cf03d15ec3e85596240dd9ba9ded9cd6b4ecafb", - "zh:7f02f12ddc198bc77cf063b6cbb31c98722ababcc29161d67c6bac0835d656aa", - "zh:9ad796ccc504b56be934c73b7512583bf5a71c030b2dcb7015a8de56b5e6b220", - "zh:ac7795e5bb335c6b597e423400cb0f8748d49247d1c9b60e69ff81a70039c5f9", - "zh:b243fd2983f0e6fa05f0e0f81e1c646bec95b375ac14ce70b36987aefcbbfd07", - "zh:b9b7f18d6e5005f3f9ccd4c90170f0a4c9e30df1a26bf7a9981a358248a50019", - "zh:ef98d47cd7b9b3db5d5d5ae4c2e73e07d40f69849f04fac9be88345e07055b02", - "zh:f569b65999264a9416862bca5cd2a6177d94ccb0424f3a4ef424428912b9cb3c", - ] -} diff --git a/inputs/gcp/managed_kafka/google_managed_kafka_connect_cluster/enforce_private_networking/c.tf b/inputs/gcp/managed_kafka/google_managed_kafka_connect_cluster/enforce_private_networking/c.tf deleted file mode 100644 index b7493f6f9..000000000 --- a/inputs/gcp/managed_kafka/google_managed_kafka_connect_cluster/enforce_private_networking/c.tf +++ /dev/null @@ -1,61 +0,0 @@ -# Describe your resource type here -# Keep "c" as the name to indicate that this resource and its attributes are compliant - -resource "google_project" "project" { - project_id = "tf-test-compliant" - name = "tf-test-compliant" - org_id = "123456789" - billing_account = "000000-0000000-0000000-000000" - provider = google-beta -} - -resource "google_managed_kafka_cluster" "gmk_cluster" { - project = google_project.project.project_id - cluster_id = "my-cluster" - location = "us-central1" - - capacity_config { - vcpu_count = 3 - memory_bytes = 3221225472 # 3 GiB - } - - gcp_config { - access_config { - network_configs { - subnet = "projects/${google_project.project.project_id}/regions/us-central1/subnetworks/default" - } - } - } - - provider = google-beta -} - - -resource "google_managed_kafka_connect_cluster" "c" { - - project = google_project.project.project_id - connect_cluster_id = "compliant-connect-cluster" - kafka_cluster = "projects/${google_project.project.project_id}/locations/us-central1/clusters/${google_managed_kafka_cluster.gmk_cluster.cluster_id}" - location = "us-central1" - - capacity_config { - vcpu_count = 4 - memory_bytes = 4294967296 - } - - gcp_config { - access_config { - network_configs { - primary_subnet = "projects/${google_project.project.project_id}/regions/us-central1/subnetworks/default" - dns_domain_names = ["${google_managed_kafka_cluster.gmk_cluster.cluster_id}.us-central1.managedkafka.${google_project.project.project_id}.cloud.goog"] - } - } - } - - labels = { - environment = "production" - } - - provider = google-beta -} - diff --git a/inputs/gcp/managed_kafka/google_managed_kafka_connect_cluster/enforce_private_networking/nc.tf b/inputs/gcp/managed_kafka/google_managed_kafka_connect_cluster/enforce_private_networking/nc.tf deleted file mode 100644 index 9e800cefa..000000000 --- a/inputs/gcp/managed_kafka/google_managed_kafka_connect_cluster/enforce_private_networking/nc.tf +++ /dev/null @@ -1,57 +0,0 @@ -resource "google_project" "project_nc" { - project_id = "tf-test-noncompliant" - name = "tf-test-noncompliant" - org_id = "123456789" - billing_account = "000000-0000000-0000000-000000" - provider = google-beta -} - -resource "google_managed_kafka_cluster" "gmk_cluster_nc" { - project = google_project.project_nc.project_id - cluster_id = "my-cluster-nc" - location = "us-central1" - - capacity_config { - vcpu_count = 3 - memory_bytes = 3221225472 - } - - gcp_config { - access_config { - network_configs { - subnet = "projects/${google_project.project_nc.project_id}/regions/us-central1/subnetworks/default" - } - } - } - - provider = google-beta -} - - -resource "google_managed_kafka_connect_cluster" "nc" { - - project = google_project.project_nc.project_id - connect_cluster_id = "noncompliant-connect-cluster" - kafka_cluster = "projects/${google_project.project_nc.project_id}/locations/us-central1/clusters/${google_managed_kafka_cluster.gmk_cluster_nc.cluster_id}" - location = "us-central1" - - capacity_config { - vcpu_count = 2 # ❌ Violates policy (minimum 3) - memory_bytes = 2147483648 # ❌ 2 GiB, below minimum - } - - gcp_config { - access_config { - network_configs { - primary_subnet = "projects/${google_project.project_nc.project_id}/regions/us-central1/subnetworks/default" - dns_domain_names = ["${google_managed_kafka_cluster.gmk_cluster_nc.cluster_id}.us-central1.managedkafka.${google_project.project_nc.project_id}.cloud.goog"] - } - } - } - - labels = { - environment = "testing" - } - - provider = google-beta -} diff --git a/inputs/gcp/managed_kafka/google_managed_kafka_connector/enforce_connector/c.tf b/inputs/gcp/managed_kafka/google_managed_kafka_connector/enforce_connector/c.tf index 7d1279d53..958ac87fa 100644 --- a/inputs/gcp/managed_kafka/google_managed_kafka_connector/enforce_connector/c.tf +++ b/inputs/gcp/managed_kafka/google_managed_kafka_connector/enforce_connector/c.tf @@ -51,7 +51,7 @@ resource "google_managed_kafka_connect_cluster" "connect_cluster_c" { provider = google-beta } -resource "google_managed_kafka_connector" "connector_c" { +resource "google_managed_kafka_connector" "c" { project = google_project.project_c.project_id connector_id = "compliant-connector" connect_cluster = google_managed_kafka_connect_cluster.connect_cluster_c.connect_cluster_id @@ -61,7 +61,7 @@ resource "google_managed_kafka_connector" "connector_c" { "connector.class" = "com.google.pubsub.kafka.sink.CloudPubSubSinkConnector" "name" = "compliant-connector" "tasks.max" = "1" - "topics" = "compliant-topic" + "topics" = "topics" "cps.topic" = "compliant-pubsub" "cps.project" = google_project.project_c.project_id "value.converter" = "org.apache.kafka.connect.storage.StringConverter" diff --git a/inputs/gcp/managed_kafka/google_managed_kafka_connector/enforce_connector/nc.tf b/inputs/gcp/managed_kafka/google_managed_kafka_connector/enforce_connector/nc.tf index 5370b2bce..d7e56487b 100644 --- a/inputs/gcp/managed_kafka/google_managed_kafka_connector/enforce_connector/nc.tf +++ b/inputs/gcp/managed_kafka/google_managed_kafka_connector/enforce_connector/nc.tf @@ -52,7 +52,7 @@ resource "google_managed_kafka_connect_cluster" "connect_cluster_nc" { provider = google-beta } -resource "google_managed_kafka_connector" "connector_nc" { +resource "google_managed_kafka_connector" "nc" { project = google_project.project_nc.project_id connector_id = "noncompliant-connector" connect_cluster = google_managed_kafka_connect_cluster.connect_cluster_nc.connect_cluster_id diff --git a/inputs/gcp/managed_kafka/google_managed_kafka_topic/secure_topic_config/c.tf b/inputs/gcp/managed_kafka/google_managed_kafka_topic/secure_topic_config/c.tf index 3365b4fae..dceb0e138 100644 --- a/inputs/gcp/managed_kafka/google_managed_kafka_topic/secure_topic_config/c.tf +++ b/inputs/gcp/managed_kafka/google_managed_kafka_topic/secure_topic_config/c.tf @@ -3,7 +3,7 @@ resource "google_managed_kafka_topic" "c" { topic_id = "secure-topic" - cluster = "my-secure-cluster" + cluster = "c" location = "us-central1" partition_count = 3 replication_factor = 3 diff --git a/inputs/gcp/managed_kafka/google_managed_kafka_topic/secure_topic_config/nc.tf b/inputs/gcp/managed_kafka/google_managed_kafka_topic/secure_topic_config/nc.tf index e7731c211..ef968495b 100644 --- a/inputs/gcp/managed_kafka/google_managed_kafka_topic/secure_topic_config/nc.tf +++ b/inputs/gcp/managed_kafka/google_managed_kafka_topic/secure_topic_config/nc.tf @@ -3,7 +3,7 @@ resource "google_managed_kafka_topic" "nc" { topic_id = "insecure-topic" - cluster = "my-insecure-cluster" + cluster = "nc" location = "us-central1" partition_count = 1 replication_factor = 1 diff --git a/inputs/gcp/network/.terraform.lock.hcl b/inputs/gcp/network/.terraform.lock.hcl index 2333ee9ed..2688a2c4d 100644 --- a/inputs/gcp/network/.terraform.lock.hcl +++ b/inputs/gcp/network/.terraform.lock.hcl @@ -5,6 +5,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "7.2.0" hashes = [ "h1:18VXFhnaRathSq3gNdyy7NNSqNxcm/m6lHnXgFp/AHY=", + "h1:n9j0rZHrmXEay4dYo0D+RGS7X8eQr+YZ0MupX8GaMfI=", "zh:0f036e400c90ae45289b948afb49ca938d169fb4a31d7560b345fd0ae5121407", "zh:28a7c683656178456dc7942f051df46052150cee74da7535e7ca8748a83baf30", "zh:2994083c634cff44de626b4bfca3e5e8ed5b2a08baa6f4c4fa4b217d5f49559a", diff --git a/inputs/gcp/network/plan b/inputs/gcp/network/plan deleted file mode 100644 index cde0824d4..000000000 Binary files a/inputs/gcp/network/plan and /dev/null differ diff --git a/inputs/gcp/network/plan.json b/inputs/gcp/network/plan.json deleted file mode 100644 index 49a40c104..000000000 Binary files a/inputs/gcp/network/plan.json and /dev/null differ diff --git a/inputs/gcp/os_config_v2/policy_orchestrator/action/.terraform.lock.hcl b/inputs/gcp/os_config_v2/policy_orchestrator/action/.terraform.lock.hcl index 63b6855e8..466ff8b2b 100644 --- a/inputs/gcp/os_config_v2/policy_orchestrator/action/.terraform.lock.hcl +++ b/inputs/gcp/os_config_v2/policy_orchestrator/action/.terraform.lock.hcl @@ -5,6 +5,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "7.0.1" hashes = [ "h1:PaaNdI7VX155p6MJzJ9KxLuu+Zw/x+iSbYQEl8NB3CA=", + "h1:tDyiGsjrgnPHdq3AV2C9T17easvo8lT7k9U5w4R+cEU=", "zh:1409f70a7757de222023d5859b1dbcab8f3bc744a81a4d7c39aac4cf249e16ad", "zh:24ca670db87d5d075852b0df8fc0d198415b02d465e853d93a18e78b4dc2b8f9", "zh:52b8139dc3acda118576c2cccd228fd8b85e20e1240b5002c0a8ee96a3ea6e9a", diff --git a/inputs/gcp/os_config_v2/policy_orchestrator/action/c.tf b/inputs/gcp/os_config_v2/policy_orchestrator/action/c.tf index 4c312ac8b..bc6dc36a7 100644 --- a/inputs/gcp/os_config_v2/policy_orchestrator/action/c.tf +++ b/inputs/gcp/os_config_v2/policy_orchestrator/action/c.tf @@ -1,7 +1,7 @@ resource "google_os_config_v2_policy_orchestrator" "c" { policy_orchestrator_id = "po" project = "121623553414" - state = "ACTIVE" + state = "STOPPED" action = "UPSERT" orchestrated_resource { diff --git a/inputs/gcp/os_config_v2/policy_orchestrator/action/plan.json b/inputs/gcp/os_config_v2/policy_orchestrator/action/plan.json new file mode 100644 index 000000000..82517cd83 --- /dev/null +++ b/inputs/gcp/os_config_v2/policy_orchestrator/action/plan.json @@ -0,0 +1 @@ +{"format_version":"1.2","terraform_version":"1.13.3","planned_values":{"root_module":{"resources":[{"address":"google_os_config_v2_policy_orchestrator.c","mode":"managed","type":"google_os_config_v2_policy_orchestrator","name":"c","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"action":"UPSERT","description":null,"effective_labels":{"goog-terraform-provisioned":"true","state":"active"},"labels":{"state":"active"},"orchestrated_resource":[{"id":"test-orchestrated-resource","os_policy_assignment_v1_payload":[{"description":null,"instance_filter":[{"all":null,"exclusion_labels":[],"inclusion_labels":[],"inventories":[{"os_short_name":"Debian","os_version":null}]}],"name":null,"os_policies":[{"allow_no_resource_group_match":null,"description":null,"id":"test-os-policy","mode":"VALIDATION","resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"id":"resource-tf","pkg":[],"repository":[]}]}]}],"rollout":[{"disruption_budget":[{"fixed":null,"percent":100}],"min_wait_duration":"60s"}]}]}],"orchestration_scope":[],"policy_orchestrator_id":"po","project":"121623553414","state":"STOPPED","terraform_labels":{"goog-terraform-provisioned":"true","state":"active"},"timeouts":null},"sensitive_values":{"effective_labels":{},"labels":{},"orchestrated_resource":[{"os_policy_assignment_v1_payload":[{"instance_filter":[{"exclusion_labels":[],"inclusion_labels":[],"inventories":[{}]}],"os_policies":[{"resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"pkg":[],"repository":[]}]}]}],"rollout":[{"disruption_budget":[{}]}]}]}],"orchestration_scope":[],"orchestration_state":[],"terraform_labels":{}}},{"address":"google_os_config_v2_policy_orchestrator.nc","mode":"managed","type":"google_os_config_v2_policy_orchestrator","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"action":"DELETE","description":null,"effective_labels":{"goog-terraform-provisioned":"true","state":"active"},"labels":{"state":"active"},"orchestrated_resource":[{"id":"test-orchestrated-resource","os_policy_assignment_v1_payload":[{"description":null,"instance_filter":[{"all":null,"exclusion_labels":[],"inclusion_labels":[],"inventories":[{"os_short_name":"Debian","os_version":null}]}],"name":null,"os_policies":[{"allow_no_resource_group_match":null,"description":null,"id":"test-os-policy","mode":"VALIDATION","resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"id":"resource-tf","pkg":[],"repository":[]}]}]}],"rollout":[{"disruption_budget":[{"fixed":null,"percent":100}],"min_wait_duration":"60s"}]}]}],"orchestration_scope":[],"policy_orchestrator_id":"p1","project":"121623553414","state":"ACTIVE","terraform_labels":{"goog-terraform-provisioned":"true","state":"active"},"timeouts":null},"sensitive_values":{"effective_labels":{},"labels":{},"orchestrated_resource":[{"os_policy_assignment_v1_payload":[{"instance_filter":[{"exclusion_labels":[],"inclusion_labels":[],"inventories":[{}]}],"os_policies":[{"resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"pkg":[],"repository":[]}]}]}],"rollout":[{"disruption_budget":[{}]}]}]}],"orchestration_scope":[],"orchestration_state":[],"terraform_labels":{}}}]}},"resource_changes":[{"address":"google_os_config_v2_policy_orchestrator.c","mode":"managed","type":"google_os_config_v2_policy_orchestrator","name":"c","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"action":"UPSERT","description":null,"effective_labels":{"goog-terraform-provisioned":"true","state":"active"},"labels":{"state":"active"},"orchestrated_resource":[{"id":"test-orchestrated-resource","os_policy_assignment_v1_payload":[{"description":null,"instance_filter":[{"all":null,"exclusion_labels":[],"inclusion_labels":[],"inventories":[{"os_short_name":"Debian","os_version":null}]}],"name":null,"os_policies":[{"allow_no_resource_group_match":null,"description":null,"id":"test-os-policy","mode":"VALIDATION","resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"id":"resource-tf","pkg":[],"repository":[]}]}]}],"rollout":[{"disruption_budget":[{"fixed":null,"percent":100}],"min_wait_duration":"60s"}]}]}],"orchestration_scope":[],"policy_orchestrator_id":"po","project":"121623553414","state":"STOPPED","terraform_labels":{"goog-terraform-provisioned":"true","state":"active"},"timeouts":null},"after_unknown":{"create_time":true,"effective_labels":{},"id":true,"labels":{},"name":true,"orchestrated_resource":[{"os_policy_assignment_v1_payload":[{"baseline":true,"deleted":true,"instance_filter":[{"exclusion_labels":[],"inclusion_labels":[],"inventories":[{}]}],"os_policies":[{"resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"pkg":[],"repository":[]}]}]}],"reconciling":true,"revision_create_time":true,"revision_id":true,"rollout":[{"disruption_budget":[{}]}],"rollout_state":true,"uid":true}]}],"orchestration_scope":[],"orchestration_state":true,"reconciling":true,"terraform_labels":{},"update_time":true},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"labels":{},"orchestrated_resource":[{"os_policy_assignment_v1_payload":[{"instance_filter":[{"exclusion_labels":[],"inclusion_labels":[],"inventories":[{}]}],"os_policies":[{"resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"pkg":[],"repository":[]}]}]}],"rollout":[{"disruption_budget":[{}]}]}]}],"orchestration_scope":[],"orchestration_state":[],"terraform_labels":{}}}},{"address":"google_os_config_v2_policy_orchestrator.nc","mode":"managed","type":"google_os_config_v2_policy_orchestrator","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"action":"DELETE","description":null,"effective_labels":{"goog-terraform-provisioned":"true","state":"active"},"labels":{"state":"active"},"orchestrated_resource":[{"id":"test-orchestrated-resource","os_policy_assignment_v1_payload":[{"description":null,"instance_filter":[{"all":null,"exclusion_labels":[],"inclusion_labels":[],"inventories":[{"os_short_name":"Debian","os_version":null}]}],"name":null,"os_policies":[{"allow_no_resource_group_match":null,"description":null,"id":"test-os-policy","mode":"VALIDATION","resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"id":"resource-tf","pkg":[],"repository":[]}]}]}],"rollout":[{"disruption_budget":[{"fixed":null,"percent":100}],"min_wait_duration":"60s"}]}]}],"orchestration_scope":[],"policy_orchestrator_id":"p1","project":"121623553414","state":"ACTIVE","terraform_labels":{"goog-terraform-provisioned":"true","state":"active"},"timeouts":null},"after_unknown":{"create_time":true,"effective_labels":{},"id":true,"labels":{},"name":true,"orchestrated_resource":[{"os_policy_assignment_v1_payload":[{"baseline":true,"deleted":true,"instance_filter":[{"exclusion_labels":[],"inclusion_labels":[],"inventories":[{}]}],"os_policies":[{"resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"pkg":[],"repository":[]}]}]}],"reconciling":true,"revision_create_time":true,"revision_id":true,"rollout":[{"disruption_budget":[{}]}],"rollout_state":true,"uid":true}]}],"orchestration_scope":[],"orchestration_state":true,"reconciling":true,"terraform_labels":{},"update_time":true},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"labels":{},"orchestrated_resource":[{"os_policy_assignment_v1_payload":[{"instance_filter":[{"exclusion_labels":[],"inclusion_labels":[],"inventories":[{}]}],"os_policies":[{"resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"pkg":[],"repository":[]}]}]}],"rollout":[{"disruption_budget":[{}]}]}]}],"orchestration_scope":[],"orchestration_state":[],"terraform_labels":{}}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_os_config_v2_policy_orchestrator.c","mode":"managed","type":"google_os_config_v2_policy_orchestrator","name":"c","provider_config_key":"google","expressions":{"action":{"constant_value":"UPSERT"},"labels":{"constant_value":{"state":"active"}},"orchestrated_resource":[{"id":{"constant_value":"test-orchestrated-resource"},"os_policy_assignment_v1_payload":[{"instance_filter":[{"inventories":[{"os_short_name":{"constant_value":"Debian"}}]}],"os_policies":[{"id":{"constant_value":"test-os-policy"},"mode":{"constant_value":"VALIDATION"},"resource_groups":[{"resources":[{"id":{"constant_value":"resource-tf"}}]}]}],"rollout":[{"disruption_budget":[{"percent":{"constant_value":100}}],"min_wait_duration":{"constant_value":"60s"}}]}]}],"policy_orchestrator_id":{"constant_value":"po"},"project":{"constant_value":"121623553414"},"state":{"constant_value":"STOPPED"}},"schema_version":0},{"address":"google_os_config_v2_policy_orchestrator.nc","mode":"managed","type":"google_os_config_v2_policy_orchestrator","name":"nc","provider_config_key":"google","expressions":{"action":{"constant_value":"DELETE"},"labels":{"constant_value":{"state":"active"}},"orchestrated_resource":[{"id":{"constant_value":"test-orchestrated-resource"},"os_policy_assignment_v1_payload":[{"instance_filter":[{"inventories":[{"os_short_name":{"constant_value":"Debian"}}]}],"os_policies":[{"id":{"constant_value":"test-os-policy"},"mode":{"constant_value":"VALIDATION"},"resource_groups":[{"resources":[{"id":{"constant_value":"resource-tf"}}]}]}],"rollout":[{"disruption_budget":[{"percent":{"constant_value":100}}],"min_wait_duration":{"constant_value":"60s"}}]}]}],"policy_orchestrator_id":{"constant_value":"p1"},"project":{"constant_value":"121623553414"},"state":{"constant_value":"ACTIVE"}},"schema_version":0}]}},"timestamp":"2026-02-11T03:46:07Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/os_config_v2/policy_orchestrator/orchestrated_resource/.terraform.lock.hcl b/inputs/gcp/os_config_v2/policy_orchestrator/orchestrated_resource/.terraform.lock.hcl index 68a67f06c..0fbda8d16 100644 --- a/inputs/gcp/os_config_v2/policy_orchestrator/orchestrated_resource/.terraform.lock.hcl +++ b/inputs/gcp/os_config_v2/policy_orchestrator/orchestrated_resource/.terraform.lock.hcl @@ -4,6 +4,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "6.49.1" hashes = [ + "h1:5G/OEkmI8T+P+d2hi+i8zpK4ewi9yaituHAZHAyyuxg=", "h1:ppc+LZU1c/dslUrFcAHUfItfexWthbqw0RSkZznexYQ=", "zh:0fca29d64bee30984645a9c88076a5e26213b3f54b75a89ae64ca3148ea9fcd9", "zh:2496949c284d0d0982a8d53ac18f5c3d8f52beb0b94109098847944a74f455be", diff --git a/inputs/gcp/os_config_v2/policy_orchestrator/orchestrated_resource/plan.json b/inputs/gcp/os_config_v2/policy_orchestrator/orchestrated_resource/plan.json new file mode 100644 index 000000000..22be94e30 --- /dev/null +++ b/inputs/gcp/os_config_v2/policy_orchestrator/orchestrated_resource/plan.json @@ -0,0 +1 @@ +{"format_version":"1.2","terraform_version":"1.13.3","planned_values":{"root_module":{"resources":[{"address":"google_os_config_v2_policy_orchestrator.c","mode":"managed","type":"google_os_config_v2_policy_orchestrator","name":"c","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"action":"UPSERT","description":null,"effective_labels":{"goog-terraform-provisioned":"true","state":"active"},"labels":{"state":"active"},"orchestrated_resource":[{"id":"test-orchestrated-resource","os_policy_assignment_v1_payload":[{"description":null,"instance_filter":[{"all":null,"exclusion_labels":[],"inclusion_labels":[],"inventories":[{"os_short_name":"Debian","os_version":null}]}],"name":null,"os_policies":[{"allow_no_resource_group_match":null,"description":null,"id":"test-os-policy","mode":"VALIDATION","resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"id":"Nmap","pkg":[],"repository":[{"apt":[{"archive_type":"DEB","components":["main"],"distribution":"focal","gpg_key":null,"uri":"ppa:nmap/nmap"}],"goo":[],"yum":[],"zypper":[]}]}]}]}],"rollout":[{"disruption_budget":[{"fixed":null,"percent":100}],"min_wait_duration":"60s"}]}]}],"orchestration_scope":[],"policy_orchestrator_id":"po","project":"121623553414","state":"ACTIVE","terraform_labels":{"goog-terraform-provisioned":"true","state":"active"},"timeouts":null},"sensitive_values":{"effective_labels":{},"labels":{},"orchestrated_resource":[{"os_policy_assignment_v1_payload":[{"instance_filter":[{"exclusion_labels":[],"inclusion_labels":[],"inventories":[{}]}],"os_policies":[{"resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"pkg":[],"repository":[{"apt":[{"components":[false]}],"goo":[],"yum":[],"zypper":[]}]}]}]}],"rollout":[{"disruption_budget":[{}]}]}]}],"orchestration_scope":[],"orchestration_state":[],"terraform_labels":{}}},{"address":"google_os_config_v2_policy_orchestrator.nc","mode":"managed","type":"google_os_config_v2_policy_orchestrator","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"action":"UPSERT","description":null,"effective_labels":{"goog-terraform-provisioned":"true","state":"active"},"labels":{"state":"active"},"orchestrated_resource":[{"id":"test-orchestrated-resource","os_policy_assignment_v1_payload":[{"description":null,"instance_filter":[{"all":null,"exclusion_labels":[],"inclusion_labels":[],"inventories":[{"os_short_name":"Windows","os_version":null}]}],"name":null,"os_policies":[{"allow_no_resource_group_match":null,"description":null,"id":"test-os-policy","mode":"MODE_UNSPECIFIED","resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"id":"Nmap","pkg":[],"repository":[{"apt":[{"archive_type":"UNSPECIFIED_ARCHIVE_TYPE","components":["main"],"distribution":"focal","gpg_key":null,"uri":"ppa:nmap/nmap"}],"goo":[],"yum":[],"zypper":[]}]}]}]}],"rollout":[{"disruption_budget":[{"fixed":null,"percent":100}],"min_wait_duration":"60s"}]}]}],"orchestration_scope":[],"policy_orchestrator_id":"p1","project":"121623553414","state":"ACTIVE","terraform_labels":{"goog-terraform-provisioned":"true","state":"active"},"timeouts":null},"sensitive_values":{"effective_labels":{},"labels":{},"orchestrated_resource":[{"os_policy_assignment_v1_payload":[{"instance_filter":[{"exclusion_labels":[],"inclusion_labels":[],"inventories":[{}]}],"os_policies":[{"resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"pkg":[],"repository":[{"apt":[{"components":[false]}],"goo":[],"yum":[],"zypper":[]}]}]}]}],"rollout":[{"disruption_budget":[{}]}]}]}],"orchestration_scope":[],"orchestration_state":[],"terraform_labels":{}}}]}},"resource_changes":[{"address":"google_os_config_v2_policy_orchestrator.c","mode":"managed","type":"google_os_config_v2_policy_orchestrator","name":"c","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"action":"UPSERT","description":null,"effective_labels":{"goog-terraform-provisioned":"true","state":"active"},"labels":{"state":"active"},"orchestrated_resource":[{"id":"test-orchestrated-resource","os_policy_assignment_v1_payload":[{"description":null,"instance_filter":[{"all":null,"exclusion_labels":[],"inclusion_labels":[],"inventories":[{"os_short_name":"Debian","os_version":null}]}],"name":null,"os_policies":[{"allow_no_resource_group_match":null,"description":null,"id":"test-os-policy","mode":"VALIDATION","resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"id":"Nmap","pkg":[],"repository":[{"apt":[{"archive_type":"DEB","components":["main"],"distribution":"focal","gpg_key":null,"uri":"ppa:nmap/nmap"}],"goo":[],"yum":[],"zypper":[]}]}]}]}],"rollout":[{"disruption_budget":[{"fixed":null,"percent":100}],"min_wait_duration":"60s"}]}]}],"orchestration_scope":[],"policy_orchestrator_id":"po","project":"121623553414","state":"ACTIVE","terraform_labels":{"goog-terraform-provisioned":"true","state":"active"},"timeouts":null},"after_unknown":{"create_time":true,"effective_labels":{},"id":true,"labels":{},"name":true,"orchestrated_resource":[{"os_policy_assignment_v1_payload":[{"baseline":true,"deleted":true,"instance_filter":[{"exclusion_labels":[],"inclusion_labels":[],"inventories":[{}]}],"os_policies":[{"resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"pkg":[],"repository":[{"apt":[{"components":[false]}],"goo":[],"yum":[],"zypper":[]}]}]}]}],"reconciling":true,"revision_create_time":true,"revision_id":true,"rollout":[{"disruption_budget":[{}]}],"rollout_state":true,"uid":true}]}],"orchestration_scope":[],"orchestration_state":true,"reconciling":true,"terraform_labels":{},"update_time":true},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"labels":{},"orchestrated_resource":[{"os_policy_assignment_v1_payload":[{"instance_filter":[{"exclusion_labels":[],"inclusion_labels":[],"inventories":[{}]}],"os_policies":[{"resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"pkg":[],"repository":[{"apt":[{"components":[false]}],"goo":[],"yum":[],"zypper":[]}]}]}]}],"rollout":[{"disruption_budget":[{}]}]}]}],"orchestration_scope":[],"orchestration_state":[],"terraform_labels":{}}}},{"address":"google_os_config_v2_policy_orchestrator.nc","mode":"managed","type":"google_os_config_v2_policy_orchestrator","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"action":"UPSERT","description":null,"effective_labels":{"goog-terraform-provisioned":"true","state":"active"},"labels":{"state":"active"},"orchestrated_resource":[{"id":"test-orchestrated-resource","os_policy_assignment_v1_payload":[{"description":null,"instance_filter":[{"all":null,"exclusion_labels":[],"inclusion_labels":[],"inventories":[{"os_short_name":"Windows","os_version":null}]}],"name":null,"os_policies":[{"allow_no_resource_group_match":null,"description":null,"id":"test-os-policy","mode":"MODE_UNSPECIFIED","resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"id":"Nmap","pkg":[],"repository":[{"apt":[{"archive_type":"UNSPECIFIED_ARCHIVE_TYPE","components":["main"],"distribution":"focal","gpg_key":null,"uri":"ppa:nmap/nmap"}],"goo":[],"yum":[],"zypper":[]}]}]}]}],"rollout":[{"disruption_budget":[{"fixed":null,"percent":100}],"min_wait_duration":"60s"}]}]}],"orchestration_scope":[],"policy_orchestrator_id":"p1","project":"121623553414","state":"ACTIVE","terraform_labels":{"goog-terraform-provisioned":"true","state":"active"},"timeouts":null},"after_unknown":{"create_time":true,"effective_labels":{},"id":true,"labels":{},"name":true,"orchestrated_resource":[{"os_policy_assignment_v1_payload":[{"baseline":true,"deleted":true,"instance_filter":[{"exclusion_labels":[],"inclusion_labels":[],"inventories":[{}]}],"os_policies":[{"resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"pkg":[],"repository":[{"apt":[{"components":[false]}],"goo":[],"yum":[],"zypper":[]}]}]}]}],"reconciling":true,"revision_create_time":true,"revision_id":true,"rollout":[{"disruption_budget":[{}]}],"rollout_state":true,"uid":true}]}],"orchestration_scope":[],"orchestration_state":true,"reconciling":true,"terraform_labels":{},"update_time":true},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"labels":{},"orchestrated_resource":[{"os_policy_assignment_v1_payload":[{"instance_filter":[{"exclusion_labels":[],"inclusion_labels":[],"inventories":[{}]}],"os_policies":[{"resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"pkg":[],"repository":[{"apt":[{"components":[false]}],"goo":[],"yum":[],"zypper":[]}]}]}]}],"rollout":[{"disruption_budget":[{}]}]}]}],"orchestration_scope":[],"orchestration_state":[],"terraform_labels":{}}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_os_config_v2_policy_orchestrator.c","mode":"managed","type":"google_os_config_v2_policy_orchestrator","name":"c","provider_config_key":"google","expressions":{"action":{"constant_value":"UPSERT"},"labels":{"constant_value":{"state":"active"}},"orchestrated_resource":[{"id":{"constant_value":"test-orchestrated-resource"},"os_policy_assignment_v1_payload":[{"instance_filter":[{"inventories":[{"os_short_name":{"constant_value":"Debian"}}]}],"os_policies":[{"id":{"constant_value":"test-os-policy"},"mode":{"constant_value":"VALIDATION"},"resource_groups":[{"resources":[{"id":{"constant_value":"Nmap"},"repository":[{"apt":[{"archive_type":{"constant_value":"DEB"},"components":{"constant_value":["main"]},"distribution":{"constant_value":"focal"},"uri":{"constant_value":"ppa:nmap/nmap"}}]}]}]}]}],"rollout":[{"disruption_budget":[{"percent":{"constant_value":100}}],"min_wait_duration":{"constant_value":"60s"}}]}]}],"policy_orchestrator_id":{"constant_value":"po"},"project":{"constant_value":"121623553414"},"state":{"constant_value":"ACTIVE"}},"schema_version":0},{"address":"google_os_config_v2_policy_orchestrator.nc","mode":"managed","type":"google_os_config_v2_policy_orchestrator","name":"nc","provider_config_key":"google","expressions":{"action":{"constant_value":"UPSERT"},"labels":{"constant_value":{"state":"active"}},"orchestrated_resource":[{"id":{"constant_value":"test-orchestrated-resource"},"os_policy_assignment_v1_payload":[{"instance_filter":[{"inventories":[{"os_short_name":{"constant_value":"Windows"}}]}],"os_policies":[{"id":{"constant_value":"test-os-policy"},"mode":{"constant_value":"MODE_UNSPECIFIED"},"resource_groups":[{"resources":[{"id":{"constant_value":"Nmap"},"repository":[{"apt":[{"archive_type":{"constant_value":"UNSPECIFIED_ARCHIVE_TYPE"},"components":{"constant_value":["main"]},"distribution":{"constant_value":"focal"},"uri":{"constant_value":"ppa:nmap/nmap"}}]}]}]}]}],"rollout":[{"disruption_budget":[{"percent":{"constant_value":100}}],"min_wait_duration":{"constant_value":"60s"}}]}]}],"policy_orchestrator_id":{"constant_value":"p1"},"project":{"constant_value":"121623553414"},"state":{"constant_value":"ACTIVE"}},"schema_version":0}]}},"timestamp":"2026-02-11T03:46:07Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/os_config_v2/policy_orchestrator/orchestration_scope/.terraform.lock.hcl b/inputs/gcp/os_config_v2/policy_orchestrator/orchestration_scope/.terraform.lock.hcl index 398f644f9..07ced9e69 100644 --- a/inputs/gcp/os_config_v2/policy_orchestrator/orchestration_scope/.terraform.lock.hcl +++ b/inputs/gcp/os_config_v2/policy_orchestrator/orchestration_scope/.terraform.lock.hcl @@ -4,6 +4,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "7.1.0" hashes = [ + "h1:1Asv8wk8g/aYL/eCbsWCSjaI16sFalhn+uoN1U8riyA=", "h1:QGAEyEO02IMwCKqbPCryzxvWkB8q8VRp8moGtwsN/w0=", "zh:271095580776620d5fa21dd60859a12d9c1d83a60e116069001e3206b78f01c3", "zh:303b7aa8c040a6d1c37792e3fb298e5311635ad0c81e3f8c31e6bb6d762c3cb0", diff --git a/inputs/gcp/os_config_v2/policy_orchestrator/orchestration_scope/plan.json b/inputs/gcp/os_config_v2/policy_orchestrator/orchestration_scope/plan.json new file mode 100644 index 000000000..7a3a6ddc2 --- /dev/null +++ b/inputs/gcp/os_config_v2/policy_orchestrator/orchestration_scope/plan.json @@ -0,0 +1 @@ +{"format_version":"1.2","terraform_version":"1.13.3","planned_values":{"root_module":{"resources":[{"address":"google_os_config_v2_policy_orchestrator.c","mode":"managed","type":"google_os_config_v2_policy_orchestrator","name":"c","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"action":"UPSERT","description":null,"effective_labels":{"environment":"test","goog-terraform-provisioned":"true","state":"active"},"labels":{"environment":"test","state":"active"},"orchestrated_resource":[{"id":"test-orchestrated-resource","os_policy_assignment_v1_payload":[{"description":null,"instance_filter":[{"all":null,"exclusion_labels":[],"inclusion_labels":[],"inventories":[{"os_short_name":"Debian","os_version":null}]}],"name":null,"os_policies":[{"allow_no_resource_group_match":null,"description":null,"id":"test-os-policy","mode":"VALIDATION","resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"id":"Nmap","pkg":[],"repository":[{"apt":[{"archive_type":"DEB","components":["main"],"distribution":"focal","gpg_key":null,"uri":"ppa:nmap/nmap"}],"goo":[],"yum":[],"zypper":[]}]}]}]}],"rollout":[{"disruption_budget":[{"fixed":null,"percent":100}],"min_wait_duration":"60s"}]}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":["Sydney","Melbourne"]}],"resource_hierarchy_selector":[]}]}],"policy_orchestrator_id":"po","project":"121623553414","state":"ACTIVE","terraform_labels":{"environment":"test","goog-terraform-provisioned":"true","state":"active"},"timeouts":null},"sensitive_values":{"effective_labels":{},"labels":{},"orchestrated_resource":[{"os_policy_assignment_v1_payload":[{"instance_filter":[{"exclusion_labels":[],"inclusion_labels":[],"inventories":[{}]}],"os_policies":[{"resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"pkg":[],"repository":[{"apt":[{"components":[false]}],"goo":[],"yum":[],"zypper":[]}]}]}]}],"rollout":[{"disruption_budget":[{}]}]}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":[false,false]}],"resource_hierarchy_selector":[]}]}],"orchestration_state":[],"terraform_labels":{}}},{"address":"google_os_config_v2_policy_orchestrator.nc","mode":"managed","type":"google_os_config_v2_policy_orchestrator","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"action":"DELETE","description":null,"effective_labels":{"environment":"production","goog-terraform-provisioned":"true","state":"active"},"labels":{"environment":"production","state":"active"},"orchestrated_resource":[{"id":"test-orchestrated-resource","os_policy_assignment_v1_payload":[{"description":null,"instance_filter":[{"all":null,"exclusion_labels":[],"inclusion_labels":[],"inventories":[{"os_short_name":"Debian","os_version":null}]}],"name":null,"os_policies":[{"allow_no_resource_group_match":null,"description":null,"id":"test-os-policy","mode":"VALIDATION","resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"id":"resource-tf","pkg":[],"repository":[]}]}]}],"rollout":[{"disruption_budget":[{"fixed":null,"percent":100}],"min_wait_duration":"60s"}]}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":["Mumbai","Hyderabad","Berlin","Frankfurt"]}],"resource_hierarchy_selector":[]}]}],"policy_orchestrator_id":"p1","project":"121623553414","state":"STOPPED","terraform_labels":{"environment":"production","goog-terraform-provisioned":"true","state":"active"},"timeouts":null},"sensitive_values":{"effective_labels":{},"labels":{},"orchestrated_resource":[{"os_policy_assignment_v1_payload":[{"instance_filter":[{"exclusion_labels":[],"inclusion_labels":[],"inventories":[{}]}],"os_policies":[{"resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"pkg":[],"repository":[]}]}]}],"rollout":[{"disruption_budget":[{}]}]}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":[false,false,false,false]}],"resource_hierarchy_selector":[]}]}],"orchestration_state":[],"terraform_labels":{}}}]}},"resource_changes":[{"address":"google_os_config_v2_policy_orchestrator.c","mode":"managed","type":"google_os_config_v2_policy_orchestrator","name":"c","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"action":"UPSERT","description":null,"effective_labels":{"environment":"test","goog-terraform-provisioned":"true","state":"active"},"labels":{"environment":"test","state":"active"},"orchestrated_resource":[{"id":"test-orchestrated-resource","os_policy_assignment_v1_payload":[{"description":null,"instance_filter":[{"all":null,"exclusion_labels":[],"inclusion_labels":[],"inventories":[{"os_short_name":"Debian","os_version":null}]}],"name":null,"os_policies":[{"allow_no_resource_group_match":null,"description":null,"id":"test-os-policy","mode":"VALIDATION","resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"id":"Nmap","pkg":[],"repository":[{"apt":[{"archive_type":"DEB","components":["main"],"distribution":"focal","gpg_key":null,"uri":"ppa:nmap/nmap"}],"goo":[],"yum":[],"zypper":[]}]}]}]}],"rollout":[{"disruption_budget":[{"fixed":null,"percent":100}],"min_wait_duration":"60s"}]}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":["Sydney","Melbourne"]}],"resource_hierarchy_selector":[]}]}],"policy_orchestrator_id":"po","project":"121623553414","state":"ACTIVE","terraform_labels":{"environment":"test","goog-terraform-provisioned":"true","state":"active"},"timeouts":null},"after_unknown":{"create_time":true,"effective_labels":{},"id":true,"labels":{},"name":true,"orchestrated_resource":[{"os_policy_assignment_v1_payload":[{"baseline":true,"deleted":true,"instance_filter":[{"exclusion_labels":[],"inclusion_labels":[],"inventories":[{}]}],"os_policies":[{"resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"pkg":[],"repository":[{"apt":[{"components":[false]}],"goo":[],"yum":[],"zypper":[]}]}]}]}],"reconciling":true,"revision_create_time":true,"revision_id":true,"rollout":[{"disruption_budget":[{}]}],"rollout_state":true,"uid":true}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":[false,false]}],"resource_hierarchy_selector":[]}]}],"orchestration_state":true,"reconciling":true,"terraform_labels":{},"update_time":true},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"labels":{},"orchestrated_resource":[{"os_policy_assignment_v1_payload":[{"instance_filter":[{"exclusion_labels":[],"inclusion_labels":[],"inventories":[{}]}],"os_policies":[{"resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"pkg":[],"repository":[{"apt":[{"components":[false]}],"goo":[],"yum":[],"zypper":[]}]}]}]}],"rollout":[{"disruption_budget":[{}]}]}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":[false,false]}],"resource_hierarchy_selector":[]}]}],"orchestration_state":[],"terraform_labels":{}}}},{"address":"google_os_config_v2_policy_orchestrator.nc","mode":"managed","type":"google_os_config_v2_policy_orchestrator","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"action":"DELETE","description":null,"effective_labels":{"environment":"production","goog-terraform-provisioned":"true","state":"active"},"labels":{"environment":"production","state":"active"},"orchestrated_resource":[{"id":"test-orchestrated-resource","os_policy_assignment_v1_payload":[{"description":null,"instance_filter":[{"all":null,"exclusion_labels":[],"inclusion_labels":[],"inventories":[{"os_short_name":"Debian","os_version":null}]}],"name":null,"os_policies":[{"allow_no_resource_group_match":null,"description":null,"id":"test-os-policy","mode":"VALIDATION","resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"id":"resource-tf","pkg":[],"repository":[]}]}]}],"rollout":[{"disruption_budget":[{"fixed":null,"percent":100}],"min_wait_duration":"60s"}]}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":["Mumbai","Hyderabad","Berlin","Frankfurt"]}],"resource_hierarchy_selector":[]}]}],"policy_orchestrator_id":"p1","project":"121623553414","state":"STOPPED","terraform_labels":{"environment":"production","goog-terraform-provisioned":"true","state":"active"},"timeouts":null},"after_unknown":{"create_time":true,"effective_labels":{},"id":true,"labels":{},"name":true,"orchestrated_resource":[{"os_policy_assignment_v1_payload":[{"baseline":true,"deleted":true,"instance_filter":[{"exclusion_labels":[],"inclusion_labels":[],"inventories":[{}]}],"os_policies":[{"resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"pkg":[],"repository":[]}]}]}],"reconciling":true,"revision_create_time":true,"revision_id":true,"rollout":[{"disruption_budget":[{}]}],"rollout_state":true,"uid":true}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":[false,false,false,false]}],"resource_hierarchy_selector":[]}]}],"orchestration_state":true,"reconciling":true,"terraform_labels":{},"update_time":true},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"labels":{},"orchestrated_resource":[{"os_policy_assignment_v1_payload":[{"instance_filter":[{"exclusion_labels":[],"inclusion_labels":[],"inventories":[{}]}],"os_policies":[{"resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"pkg":[],"repository":[]}]}]}],"rollout":[{"disruption_budget":[{}]}]}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":[false,false,false,false]}],"resource_hierarchy_selector":[]}]}],"orchestration_state":[],"terraform_labels":{}}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_os_config_v2_policy_orchestrator.c","mode":"managed","type":"google_os_config_v2_policy_orchestrator","name":"c","provider_config_key":"google","expressions":{"action":{"constant_value":"UPSERT"},"labels":{"constant_value":{"environment":"test","state":"active"}},"orchestrated_resource":[{"id":{"constant_value":"test-orchestrated-resource"},"os_policy_assignment_v1_payload":[{"instance_filter":[{"inventories":[{"os_short_name":{"constant_value":"Debian"}}]}],"os_policies":[{"id":{"constant_value":"test-os-policy"},"mode":{"constant_value":"VALIDATION"},"resource_groups":[{"resources":[{"id":{"constant_value":"Nmap"},"repository":[{"apt":[{"archive_type":{"constant_value":"DEB"},"components":{"constant_value":["main"]},"distribution":{"constant_value":"focal"},"uri":{"constant_value":"ppa:nmap/nmap"}}]}]}]}]}],"rollout":[{"disruption_budget":[{"percent":{"constant_value":100}}],"min_wait_duration":{"constant_value":"60s"}}]}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":{"constant_value":["Sydney","Melbourne"]}}]}]}],"policy_orchestrator_id":{"constant_value":"po"},"project":{"constant_value":"121623553414"},"state":{"constant_value":"ACTIVE"}},"schema_version":0},{"address":"google_os_config_v2_policy_orchestrator.nc","mode":"managed","type":"google_os_config_v2_policy_orchestrator","name":"nc","provider_config_key":"google","expressions":{"action":{"constant_value":"DELETE"},"labels":{"constant_value":{"environment":"production","state":"active"}},"orchestrated_resource":[{"id":{"constant_value":"test-orchestrated-resource"},"os_policy_assignment_v1_payload":[{"instance_filter":[{"inventories":[{"os_short_name":{"constant_value":"Debian"}}]}],"os_policies":[{"id":{"constant_value":"test-os-policy"},"mode":{"constant_value":"VALIDATION"},"resource_groups":[{"resources":[{"id":{"constant_value":"resource-tf"}}]}]}],"rollout":[{"disruption_budget":[{"percent":{"constant_value":100}}],"min_wait_duration":{"constant_value":"60s"}}]}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":{"constant_value":["Mumbai","Hyderabad","Berlin","Frankfurt"]}}]}]}],"policy_orchestrator_id":{"constant_value":"p1"},"project":{"constant_value":"121623553414"},"state":{"constant_value":"STOPPED"}},"schema_version":0}]}},"timestamp":"2026-02-11T03:46:07Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/os_config_v2/policy_orchestrator_for_folder/action/c.tf b/inputs/gcp/os_config_v2/policy_orchestrator_for_folder/action/c.tf index eb87808ee..f3d6303ba 100644 --- a/inputs/gcp/os_config_v2/policy_orchestrator_for_folder/action/c.tf +++ b/inputs/gcp/os_config_v2/policy_orchestrator_for_folder/action/c.tf @@ -62,7 +62,7 @@ resource "google_os_config_v2_policy_orchestrator_for_folder" "c" { folder_id = google_folder.my_folder.folder_id state = "STOPPED" - action = "DELETE" + action = "UPSERT" orchestrated_resource { id = "test-orchestrated-resource-folder" diff --git a/inputs/gcp/os_config_v2/policy_orchestrator_for_folder/action/plan.json b/inputs/gcp/os_config_v2/policy_orchestrator_for_folder/action/plan.json new file mode 100644 index 000000000..7a571b378 --- /dev/null +++ b/inputs/gcp/os_config_v2/policy_orchestrator_for_folder/action/plan.json @@ -0,0 +1 @@ +{"format_version":"1.2","terraform_version":"1.13.3","planned_values":{"root_module":{"resources":[{"address":"google_folder.my_folder","mode":"managed","type":"google_folder","name":"my_folder","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"deletion_protection":false,"display_name":"po-folder","parent":"organizations/123456789","tags":null,"timeouts":null},"sensitive_values":{"configured_capabilities":[]}},{"address":"google_folder.my_folder_nc","mode":"managed","type":"google_folder","name":"my_folder_nc","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"deletion_protection":false,"display_name":"po-folder","parent":"organizations/123456789","tags":null,"timeouts":null},"sensitive_values":{"configured_capabilities":[]}},{"address":"google_folder_iam_member.iam_osconfig_rollout_service_agent","mode":"managed","type":"google_folder_iam_member","name":"iam_osconfig_rollout_service_agent","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"condition":[],"role":"roles/osconfig.rolloutServiceAgent"},"sensitive_values":{"condition":[]}},{"address":"google_folder_iam_member.iam_osconfig_rollout_service_agent_nc","mode":"managed","type":"google_folder_iam_member","name":"iam_osconfig_rollout_service_agent_nc","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"condition":[],"role":"roles/osconfig.rolloutServiceAgent"},"sensitive_values":{"condition":[]}},{"address":"google_folder_iam_member.iam_osconfig_service_agent","mode":"managed","type":"google_folder_iam_member","name":"iam_osconfig_service_agent","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"condition":[],"role":"roles/osconfig.serviceAgent"},"sensitive_values":{"condition":[]}},{"address":"google_folder_iam_member.iam_osconfig_service_agent_nc","mode":"managed","type":"google_folder_iam_member","name":"iam_osconfig_service_agent_nc","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"condition":[],"role":"roles/osconfig.serviceAgent"},"sensitive_values":{"condition":[]}},{"address":"google_folder_iam_member.iam_progressiverollout_service_agent","mode":"managed","type":"google_folder_iam_member","name":"iam_progressiverollout_service_agent","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"condition":[],"role":"roles/progressiverollout.serviceAgent"},"sensitive_values":{"condition":[]}},{"address":"google_folder_iam_member.iam_progressiverollout_service_agent_nc","mode":"managed","type":"google_folder_iam_member","name":"iam_progressiverollout_service_agent_nc","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"condition":[],"role":"roles/progressiverollout.serviceAgent"},"sensitive_values":{"condition":[]}},{"address":"google_folder_service_identity.osconfig_sa","mode":"managed","type":"google_folder_service_identity","name":"osconfig_sa","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"service":"osconfig.googleapis.com","timeouts":null},"sensitive_values":{}},{"address":"google_folder_service_identity.osconfig_sa_nc","mode":"managed","type":"google_folder_service_identity","name":"osconfig_sa_nc","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"service":"osconfig.googleapis.com","timeouts":null},"sensitive_values":{}},{"address":"google_folder_service_identity.ripple_sa","mode":"managed","type":"google_folder_service_identity","name":"ripple_sa","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"service":"progressiverollout.googleapis.com","timeouts":null},"sensitive_values":{}},{"address":"google_folder_service_identity.ripple_sa_nc","mode":"managed","type":"google_folder_service_identity","name":"ripple_sa_nc","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"service":"progressiverollout.googleapis.com","timeouts":null},"sensitive_values":{}},{"address":"google_os_config_v2_policy_orchestrator_for_folder.c","mode":"managed","type":"google_os_config_v2_policy_orchestrator_for_folder","name":"c","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"action":"UPSERT","description":null,"effective_labels":{"goog-terraform-provisioned":"true","state":"active"},"labels":{"state":"active"},"orchestrated_resource":[{"id":"test-orchestrated-resource-folder","os_policy_assignment_v1_payload":[{"description":null,"instance_filter":[{"all":null,"exclusion_labels":[],"inclusion_labels":[],"inventories":[{"os_short_name":"Debian","os_version":null}]}],"name":null,"os_policies":[{"allow_no_resource_group_match":null,"description":null,"id":"test-os-policy-folder","mode":"ENFORCEMENT","resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"id":"Nmap","pkg":[],"repository":[{"apt":[{"archive_type":"DEB","components":["main"],"distribution":"focal","gpg_key":null,"uri":"ppa:nmap/nmap"}],"goo":[],"yum":[],"zypper":[]}]}]}]}],"rollout":[{"disruption_budget":[{"fixed":null,"percent":100}],"min_wait_duration":"60s"}]}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":[""]}],"resource_hierarchy_selector":[]}]}],"policy_orchestrator_id":"po-folder","state":"STOPPED","terraform_labels":{"goog-terraform-provisioned":"true","state":"active"},"timeouts":null},"sensitive_values":{"effective_labels":{},"labels":{},"orchestrated_resource":[{"os_policy_assignment_v1_payload":[{"instance_filter":[{"exclusion_labels":[],"inclusion_labels":[],"inventories":[{}]}],"os_policies":[{"resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"pkg":[],"repository":[{"apt":[{"components":[false]}],"goo":[],"yum":[],"zypper":[]}]}]}]}],"rollout":[{"disruption_budget":[{}]}]}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":[false]}],"resource_hierarchy_selector":[]}]}],"orchestration_state":[],"terraform_labels":{}}},{"address":"google_os_config_v2_policy_orchestrator_for_folder.nc","mode":"managed","type":"google_os_config_v2_policy_orchestrator_for_folder","name":"nc","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"action":"DELETE","description":null,"effective_labels":{"goog-terraform-provisioned":"true","state":"active"},"labels":{"state":"active"},"orchestrated_resource":[{"id":"test-orchestrated-resource","os_policy_assignment_v1_payload":[{"description":null,"instance_filter":[{"all":null,"exclusion_labels":[],"inclusion_labels":[],"inventories":[{"os_short_name":"Windows","os_version":null}]}],"name":null,"os_policies":[{"allow_no_resource_group_match":null,"description":null,"id":"test-os-policy","mode":"VALIDATION","resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"id":"Nmap","pkg":[],"repository":[{"apt":[{"archive_type":"DEB_SRC","components":["main"],"distribution":"focal","gpg_key":null,"uri":"ppa:nmap/nmap"}],"goo":[],"yum":[],"zypper":[]}]}]}]}],"rollout":[{"disruption_budget":[{"fixed":null,"percent":100}],"min_wait_duration":"60s"}]}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":[""]}],"resource_hierarchy_selector":[]}]}],"policy_orchestrator_id":"po-folder","state":"ACTIVE","terraform_labels":{"goog-terraform-provisioned":"true","state":"active"},"timeouts":null},"sensitive_values":{"effective_labels":{},"labels":{},"orchestrated_resource":[{"os_policy_assignment_v1_payload":[{"instance_filter":[{"exclusion_labels":[],"inclusion_labels":[],"inventories":[{}]}],"os_policies":[{"resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"pkg":[],"repository":[{"apt":[{"components":[false]}],"goo":[],"yum":[],"zypper":[]}]}]}]}],"rollout":[{"disruption_budget":[{}]}]}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":[false]}],"resource_hierarchy_selector":[]}]}],"orchestration_state":[],"terraform_labels":{}}},{"address":"time_sleep.wait_30_sec","mode":"managed","type":"time_sleep","name":"wait_30_sec","provider_name":"registry.terraform.io/hashicorp/time","schema_version":0,"values":{"create_duration":"30s","destroy_duration":null,"triggers":null},"sensitive_values":{}},{"address":"time_sleep.wait_30_sec_nc","mode":"managed","type":"time_sleep","name":"wait_30_sec_nc","provider_name":"registry.terraform.io/hashicorp/time","schema_version":0,"values":{"create_duration":"30s","destroy_duration":null,"triggers":null},"sensitive_values":{}},{"address":"time_sleep.wait_3_min","mode":"managed","type":"time_sleep","name":"wait_3_min","provider_name":"registry.terraform.io/hashicorp/time","schema_version":0,"values":{"create_duration":"180s","destroy_duration":null,"triggers":null},"sensitive_values":{}},{"address":"time_sleep.wait_3_min_nc","mode":"managed","type":"time_sleep","name":"wait_3_min_nc","provider_name":"registry.terraform.io/hashicorp/time","schema_version":0,"values":{"create_duration":"180s","destroy_duration":null,"triggers":null},"sensitive_values":{}}]}},"resource_changes":[{"address":"google_folder.my_folder","mode":"managed","type":"google_folder","name":"my_folder","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"deletion_protection":false,"display_name":"po-folder","parent":"organizations/123456789","tags":null,"timeouts":null},"after_unknown":{"configured_capabilities":true,"create_time":true,"folder_id":true,"id":true,"lifecycle_state":true,"management_project":true,"name":true},"before_sensitive":false,"after_sensitive":{"configured_capabilities":[]}}},{"address":"google_folder.my_folder_nc","mode":"managed","type":"google_folder","name":"my_folder_nc","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"deletion_protection":false,"display_name":"po-folder","parent":"organizations/123456789","tags":null,"timeouts":null},"after_unknown":{"configured_capabilities":true,"create_time":true,"folder_id":true,"id":true,"lifecycle_state":true,"management_project":true,"name":true},"before_sensitive":false,"after_sensitive":{"configured_capabilities":[]}}},{"address":"google_folder_iam_member.iam_osconfig_rollout_service_agent","mode":"managed","type":"google_folder_iam_member","name":"iam_osconfig_rollout_service_agent","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"condition":[],"role":"roles/osconfig.rolloutServiceAgent"},"after_unknown":{"condition":[],"etag":true,"folder":true,"id":true,"member":true},"before_sensitive":false,"after_sensitive":{"condition":[]}}},{"address":"google_folder_iam_member.iam_osconfig_rollout_service_agent_nc","mode":"managed","type":"google_folder_iam_member","name":"iam_osconfig_rollout_service_agent_nc","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"condition":[],"role":"roles/osconfig.rolloutServiceAgent"},"after_unknown":{"condition":[],"etag":true,"folder":true,"id":true,"member":true},"before_sensitive":false,"after_sensitive":{"condition":[]}}},{"address":"google_folder_iam_member.iam_osconfig_service_agent","mode":"managed","type":"google_folder_iam_member","name":"iam_osconfig_service_agent","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"condition":[],"role":"roles/osconfig.serviceAgent"},"after_unknown":{"condition":[],"etag":true,"folder":true,"id":true,"member":true},"before_sensitive":false,"after_sensitive":{"condition":[]}}},{"address":"google_folder_iam_member.iam_osconfig_service_agent_nc","mode":"managed","type":"google_folder_iam_member","name":"iam_osconfig_service_agent_nc","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"condition":[],"role":"roles/osconfig.serviceAgent"},"after_unknown":{"condition":[],"etag":true,"folder":true,"id":true,"member":true},"before_sensitive":false,"after_sensitive":{"condition":[]}}},{"address":"google_folder_iam_member.iam_progressiverollout_service_agent","mode":"managed","type":"google_folder_iam_member","name":"iam_progressiverollout_service_agent","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"condition":[],"role":"roles/progressiverollout.serviceAgent"},"after_unknown":{"condition":[],"etag":true,"folder":true,"id":true,"member":true},"before_sensitive":false,"after_sensitive":{"condition":[]}}},{"address":"google_folder_iam_member.iam_progressiverollout_service_agent_nc","mode":"managed","type":"google_folder_iam_member","name":"iam_progressiverollout_service_agent_nc","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"condition":[],"role":"roles/progressiverollout.serviceAgent"},"after_unknown":{"condition":[],"etag":true,"folder":true,"id":true,"member":true},"before_sensitive":false,"after_sensitive":{"condition":[]}}},{"address":"google_folder_service_identity.osconfig_sa","mode":"managed","type":"google_folder_service_identity","name":"osconfig_sa","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"service":"osconfig.googleapis.com","timeouts":null},"after_unknown":{"email":true,"folder":true,"id":true,"member":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"google_folder_service_identity.osconfig_sa_nc","mode":"managed","type":"google_folder_service_identity","name":"osconfig_sa_nc","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"service":"osconfig.googleapis.com","timeouts":null},"after_unknown":{"email":true,"folder":true,"id":true,"member":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"google_folder_service_identity.ripple_sa","mode":"managed","type":"google_folder_service_identity","name":"ripple_sa","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"service":"progressiverollout.googleapis.com","timeouts":null},"after_unknown":{"email":true,"folder":true,"id":true,"member":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"google_folder_service_identity.ripple_sa_nc","mode":"managed","type":"google_folder_service_identity","name":"ripple_sa_nc","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"service":"progressiverollout.googleapis.com","timeouts":null},"after_unknown":{"email":true,"folder":true,"id":true,"member":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"google_os_config_v2_policy_orchestrator_for_folder.c","mode":"managed","type":"google_os_config_v2_policy_orchestrator_for_folder","name":"c","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"action":"UPSERT","description":null,"effective_labels":{"goog-terraform-provisioned":"true","state":"active"},"labels":{"state":"active"},"orchestrated_resource":[{"id":"test-orchestrated-resource-folder","os_policy_assignment_v1_payload":[{"description":null,"instance_filter":[{"all":null,"exclusion_labels":[],"inclusion_labels":[],"inventories":[{"os_short_name":"Debian","os_version":null}]}],"name":null,"os_policies":[{"allow_no_resource_group_match":null,"description":null,"id":"test-os-policy-folder","mode":"ENFORCEMENT","resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"id":"Nmap","pkg":[],"repository":[{"apt":[{"archive_type":"DEB","components":["main"],"distribution":"focal","gpg_key":null,"uri":"ppa:nmap/nmap"}],"goo":[],"yum":[],"zypper":[]}]}]}]}],"rollout":[{"disruption_budget":[{"fixed":null,"percent":100}],"min_wait_duration":"60s"}]}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":[""]}],"resource_hierarchy_selector":[]}]}],"policy_orchestrator_id":"po-folder","state":"STOPPED","terraform_labels":{"goog-terraform-provisioned":"true","state":"active"},"timeouts":null},"after_unknown":{"create_time":true,"effective_labels":{},"etag":true,"folder_id":true,"id":true,"labels":{},"name":true,"orchestrated_resource":[{"os_policy_assignment_v1_payload":[{"baseline":true,"deleted":true,"etag":true,"instance_filter":[{"exclusion_labels":[],"inclusion_labels":[],"inventories":[{}]}],"os_policies":[{"resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"pkg":[],"repository":[{"apt":[{"components":[false]}],"goo":[],"yum":[],"zypper":[]}]}]}]}],"reconciling":true,"revision_create_time":true,"revision_id":true,"rollout":[{"disruption_budget":[{}]}],"rollout_state":true,"uid":true}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":[false]}],"resource_hierarchy_selector":[]}]}],"orchestration_state":true,"reconciling":true,"terraform_labels":{},"update_time":true},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"labels":{},"orchestrated_resource":[{"os_policy_assignment_v1_payload":[{"instance_filter":[{"exclusion_labels":[],"inclusion_labels":[],"inventories":[{}]}],"os_policies":[{"resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"pkg":[],"repository":[{"apt":[{"components":[false]}],"goo":[],"yum":[],"zypper":[]}]}]}]}],"rollout":[{"disruption_budget":[{}]}]}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":[false]}],"resource_hierarchy_selector":[]}]}],"orchestration_state":[],"terraform_labels":{}}}},{"address":"google_os_config_v2_policy_orchestrator_for_folder.nc","mode":"managed","type":"google_os_config_v2_policy_orchestrator_for_folder","name":"nc","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"action":"DELETE","description":null,"effective_labels":{"goog-terraform-provisioned":"true","state":"active"},"labels":{"state":"active"},"orchestrated_resource":[{"id":"test-orchestrated-resource","os_policy_assignment_v1_payload":[{"description":null,"instance_filter":[{"all":null,"exclusion_labels":[],"inclusion_labels":[],"inventories":[{"os_short_name":"Windows","os_version":null}]}],"name":null,"os_policies":[{"allow_no_resource_group_match":null,"description":null,"id":"test-os-policy","mode":"VALIDATION","resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"id":"Nmap","pkg":[],"repository":[{"apt":[{"archive_type":"DEB_SRC","components":["main"],"distribution":"focal","gpg_key":null,"uri":"ppa:nmap/nmap"}],"goo":[],"yum":[],"zypper":[]}]}]}]}],"rollout":[{"disruption_budget":[{"fixed":null,"percent":100}],"min_wait_duration":"60s"}]}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":[""]}],"resource_hierarchy_selector":[]}]}],"policy_orchestrator_id":"po-folder","state":"ACTIVE","terraform_labels":{"goog-terraform-provisioned":"true","state":"active"},"timeouts":null},"after_unknown":{"create_time":true,"effective_labels":{},"etag":true,"folder_id":true,"id":true,"labels":{},"name":true,"orchestrated_resource":[{"os_policy_assignment_v1_payload":[{"baseline":true,"deleted":true,"etag":true,"instance_filter":[{"exclusion_labels":[],"inclusion_labels":[],"inventories":[{}]}],"os_policies":[{"resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"pkg":[],"repository":[{"apt":[{"components":[false]}],"goo":[],"yum":[],"zypper":[]}]}]}]}],"reconciling":true,"revision_create_time":true,"revision_id":true,"rollout":[{"disruption_budget":[{}]}],"rollout_state":true,"uid":true}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":[false]}],"resource_hierarchy_selector":[]}]}],"orchestration_state":true,"reconciling":true,"terraform_labels":{},"update_time":true},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"labels":{},"orchestrated_resource":[{"os_policy_assignment_v1_payload":[{"instance_filter":[{"exclusion_labels":[],"inclusion_labels":[],"inventories":[{}]}],"os_policies":[{"resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"pkg":[],"repository":[{"apt":[{"components":[false]}],"goo":[],"yum":[],"zypper":[]}]}]}]}],"rollout":[{"disruption_budget":[{}]}]}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":[false]}],"resource_hierarchy_selector":[]}]}],"orchestration_state":[],"terraform_labels":{}}}},{"address":"time_sleep.wait_30_sec","mode":"managed","type":"time_sleep","name":"wait_30_sec","provider_name":"registry.terraform.io/hashicorp/time","change":{"actions":["create"],"before":null,"after":{"create_duration":"30s","destroy_duration":null,"triggers":null},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"time_sleep.wait_30_sec_nc","mode":"managed","type":"time_sleep","name":"wait_30_sec_nc","provider_name":"registry.terraform.io/hashicorp/time","change":{"actions":["create"],"before":null,"after":{"create_duration":"30s","destroy_duration":null,"triggers":null},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"time_sleep.wait_3_min","mode":"managed","type":"time_sleep","name":"wait_3_min","provider_name":"registry.terraform.io/hashicorp/time","change":{"actions":["create"],"before":null,"after":{"create_duration":"180s","destroy_duration":null,"triggers":null},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"time_sleep.wait_3_min_nc","mode":"managed","type":"time_sleep","name":"wait_3_min_nc","provider_name":"registry.terraform.io/hashicorp/time","change":{"actions":["create"],"before":null,"after":{"create_duration":"180s","destroy_duration":null,"triggers":null},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{}}}],"configuration":{"provider_config":{"google-beta":{"name":"google-beta","full_name":"registry.terraform.io/hashicorp/google-beta"},"time":{"name":"time","full_name":"registry.terraform.io/hashicorp/time"}},"root_module":{"resources":[{"address":"google_folder.my_folder","mode":"managed","type":"google_folder","name":"my_folder","provider_config_key":"google-beta","expressions":{"deletion_protection":{"constant_value":false},"display_name":{"constant_value":"po-folder"},"parent":{"constant_value":"organizations/123456789"}},"schema_version":0},{"address":"google_folder.my_folder_nc","mode":"managed","type":"google_folder","name":"my_folder_nc","provider_config_key":"google-beta","expressions":{"deletion_protection":{"constant_value":false},"display_name":{"constant_value":"po-folder"},"parent":{"constant_value":"organizations/123456789"}},"schema_version":0},{"address":"google_folder_iam_member.iam_osconfig_rollout_service_agent","mode":"managed","type":"google_folder_iam_member","name":"iam_osconfig_rollout_service_agent","provider_config_key":"google-beta","expressions":{"folder":{"references":["google_folder.my_folder.folder_id","google_folder.my_folder"]},"member":{"references":["google_folder.my_folder.folder_id","google_folder.my_folder"]},"role":{"constant_value":"roles/osconfig.rolloutServiceAgent"}},"schema_version":0,"depends_on":["google_folder_iam_member.iam_osconfig_service_agent"]},{"address":"google_folder_iam_member.iam_osconfig_rollout_service_agent_nc","mode":"managed","type":"google_folder_iam_member","name":"iam_osconfig_rollout_service_agent_nc","provider_config_key":"google-beta","expressions":{"folder":{"references":["google_folder.my_folder.folder_id","google_folder.my_folder"]},"member":{"references":["google_folder.my_folder.folder_id","google_folder.my_folder"]},"role":{"constant_value":"roles/osconfig.rolloutServiceAgent"}},"schema_version":0,"depends_on":["google_folder_iam_member.iam_osconfig_service_agent"]},{"address":"google_folder_iam_member.iam_osconfig_service_agent","mode":"managed","type":"google_folder_iam_member","name":"iam_osconfig_service_agent","provider_config_key":"google-beta","expressions":{"folder":{"references":["google_folder.my_folder.folder_id","google_folder.my_folder"]},"member":{"references":["google_folder_service_identity.osconfig_sa.member","google_folder_service_identity.osconfig_sa"]},"role":{"constant_value":"roles/osconfig.serviceAgent"}},"schema_version":0,"depends_on":["time_sleep.wait_30_sec"]},{"address":"google_folder_iam_member.iam_osconfig_service_agent_nc","mode":"managed","type":"google_folder_iam_member","name":"iam_osconfig_service_agent_nc","provider_config_key":"google-beta","expressions":{"folder":{"references":["google_folder.my_folder.folder_id","google_folder.my_folder"]},"member":{"references":["google_folder_service_identity.osconfig_sa.member","google_folder_service_identity.osconfig_sa"]},"role":{"constant_value":"roles/osconfig.serviceAgent"}},"schema_version":0,"depends_on":["time_sleep.wait_30_sec"]},{"address":"google_folder_iam_member.iam_progressiverollout_service_agent","mode":"managed","type":"google_folder_iam_member","name":"iam_progressiverollout_service_agent","provider_config_key":"google-beta","expressions":{"folder":{"references":["google_folder.my_folder.folder_id","google_folder.my_folder"]},"member":{"references":["google_folder_service_identity.ripple_sa.member","google_folder_service_identity.ripple_sa"]},"role":{"constant_value":"roles/progressiverollout.serviceAgent"}},"schema_version":0,"depends_on":["google_folder_iam_member.iam_osconfig_rollout_service_agent"]},{"address":"google_folder_iam_member.iam_progressiverollout_service_agent_nc","mode":"managed","type":"google_folder_iam_member","name":"iam_progressiverollout_service_agent_nc","provider_config_key":"google-beta","expressions":{"folder":{"references":["google_folder.my_folder.folder_id","google_folder.my_folder"]},"member":{"references":["google_folder_service_identity.ripple_sa.member","google_folder_service_identity.ripple_sa"]},"role":{"constant_value":"roles/progressiverollout.serviceAgent"}},"schema_version":0,"depends_on":["google_folder_iam_member.iam_osconfig_rollout_service_agent"]},{"address":"google_folder_service_identity.osconfig_sa","mode":"managed","type":"google_folder_service_identity","name":"osconfig_sa","provider_config_key":"google-beta","expressions":{"folder":{"references":["google_folder.my_folder.folder_id","google_folder.my_folder"]},"service":{"constant_value":"osconfig.googleapis.com"}},"schema_version":0},{"address":"google_folder_service_identity.osconfig_sa_nc","mode":"managed","type":"google_folder_service_identity","name":"osconfig_sa_nc","provider_config_key":"google-beta","expressions":{"folder":{"references":["google_folder.my_folder.folder_id","google_folder.my_folder"]},"service":{"constant_value":"osconfig.googleapis.com"}},"schema_version":0},{"address":"google_folder_service_identity.ripple_sa","mode":"managed","type":"google_folder_service_identity","name":"ripple_sa","provider_config_key":"google-beta","expressions":{"folder":{"references":["google_folder.my_folder.folder_id","google_folder.my_folder"]},"service":{"constant_value":"progressiverollout.googleapis.com"}},"schema_version":0},{"address":"google_folder_service_identity.ripple_sa_nc","mode":"managed","type":"google_folder_service_identity","name":"ripple_sa_nc","provider_config_key":"google-beta","expressions":{"folder":{"references":["google_folder.my_folder.folder_id","google_folder.my_folder"]},"service":{"constant_value":"progressiverollout.googleapis.com"}},"schema_version":0},{"address":"google_os_config_v2_policy_orchestrator_for_folder.c","mode":"managed","type":"google_os_config_v2_policy_orchestrator_for_folder","name":"c","provider_config_key":"google-beta","expressions":{"action":{"constant_value":"UPSERT"},"folder_id":{"references":["google_folder.my_folder.folder_id","google_folder.my_folder"]},"labels":{"constant_value":{"state":"active"}},"orchestrated_resource":[{"id":{"constant_value":"test-orchestrated-resource-folder"},"os_policy_assignment_v1_payload":[{"instance_filter":[{"inventories":[{"os_short_name":{"constant_value":"Debian"}}]}],"os_policies":[{"id":{"constant_value":"test-os-policy-folder"},"mode":{"constant_value":"ENFORCEMENT"},"resource_groups":[{"resources":[{"id":{"constant_value":"Nmap"},"repository":[{"apt":[{"archive_type":{"constant_value":"DEB"},"components":{"constant_value":["main"]},"distribution":{"constant_value":"focal"},"uri":{"constant_value":"ppa:nmap/nmap"}}]}]}]}]}],"rollout":[{"disruption_budget":[{"percent":{"constant_value":100}}],"min_wait_duration":{"constant_value":"60s"}}]}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":{"constant_value":[""]}}]}]}],"policy_orchestrator_id":{"constant_value":"po-folder"},"state":{"constant_value":"STOPPED"}},"schema_version":0,"depends_on":["time_sleep.wait_3_min"]},{"address":"google_os_config_v2_policy_orchestrator_for_folder.nc","mode":"managed","type":"google_os_config_v2_policy_orchestrator_for_folder","name":"nc","provider_config_key":"google-beta","expressions":{"action":{"constant_value":"DELETE"},"folder_id":{"references":["google_folder.my_folder.folder_id","google_folder.my_folder"]},"labels":{"constant_value":{"state":"active"}},"orchestrated_resource":[{"id":{"constant_value":"test-orchestrated-resource"},"os_policy_assignment_v1_payload":[{"instance_filter":[{"inventories":[{"os_short_name":{"constant_value":"Windows"}}]}],"os_policies":[{"id":{"constant_value":"test-os-policy"},"mode":{"constant_value":"VALIDATION"},"resource_groups":[{"resources":[{"id":{"constant_value":"Nmap"},"repository":[{"apt":[{"archive_type":{"constant_value":"DEB_SRC"},"components":{"constant_value":["main"]},"distribution":{"constant_value":"focal"},"uri":{"constant_value":"ppa:nmap/nmap"}}]}]}]}]}],"rollout":[{"disruption_budget":[{"percent":{"constant_value":100}}],"min_wait_duration":{"constant_value":"60s"}}]}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":{"constant_value":[""]}}]}]}],"policy_orchestrator_id":{"constant_value":"po-folder"},"state":{"constant_value":"ACTIVE"}},"schema_version":0,"depends_on":["time_sleep.wait_3_min"]},{"address":"time_sleep.wait_30_sec","mode":"managed","type":"time_sleep","name":"wait_30_sec","provider_config_key":"time","expressions":{"create_duration":{"constant_value":"30s"}},"schema_version":0,"depends_on":["google_folder_service_identity.osconfig_sa","google_folder_service_identity.ripple_sa"]},{"address":"time_sleep.wait_30_sec_nc","mode":"managed","type":"time_sleep","name":"wait_30_sec_nc","provider_config_key":"time","expressions":{"create_duration":{"constant_value":"30s"}},"schema_version":0,"depends_on":["google_folder_service_identity.osconfig_sa","google_folder_service_identity.ripple_sa"]},{"address":"time_sleep.wait_3_min","mode":"managed","type":"time_sleep","name":"wait_3_min","provider_config_key":"time","expressions":{"create_duration":{"constant_value":"180s"}},"schema_version":0,"depends_on":["google_folder_iam_member.iam_progressiverollout_service_agent"]},{"address":"time_sleep.wait_3_min_nc","mode":"managed","type":"time_sleep","name":"wait_3_min_nc","provider_config_key":"time","expressions":{"create_duration":{"constant_value":"180s"}},"schema_version":0,"depends_on":["google_folder_iam_member.iam_progressiverollout_service_agent"]}]}},"relevant_attributes":[{"resource":"google_folder.my_folder","attribute":["folder_id"]},{"resource":"google_folder_service_identity.osconfig_sa","attribute":["member"]},{"resource":"google_folder_service_identity.ripple_sa","attribute":["member"]}],"timestamp":"2026-02-11T03:46:07Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/os_config_v2/policy_orchestrator_for_folder/orchestrated_resource/plan.json b/inputs/gcp/os_config_v2/policy_orchestrator_for_folder/orchestrated_resource/plan.json new file mode 100644 index 000000000..daf50eedc --- /dev/null +++ b/inputs/gcp/os_config_v2/policy_orchestrator_for_folder/orchestrated_resource/plan.json @@ -0,0 +1 @@ +{"format_version":"1.2","terraform_version":"1.13.3","planned_values":{"root_module":{"resources":[{"address":"google_folder.my_folder","mode":"managed","type":"google_folder","name":"my_folder","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"deletion_protection":false,"display_name":"po-folder","parent":"organizations/123456789","tags":null,"timeouts":null},"sensitive_values":{"configured_capabilities":[]}},{"address":"google_folder.my_folder_nc","mode":"managed","type":"google_folder","name":"my_folder_nc","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"deletion_protection":false,"display_name":"po-folder","parent":"organizations/123456789","tags":null,"timeouts":null},"sensitive_values":{"configured_capabilities":[]}},{"address":"google_folder_iam_member.iam_osconfig_rollout_service_agent","mode":"managed","type":"google_folder_iam_member","name":"iam_osconfig_rollout_service_agent","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"condition":[],"role":"roles/osconfig.rolloutServiceAgent"},"sensitive_values":{"condition":[]}},{"address":"google_folder_iam_member.iam_osconfig_rollout_service_agent_nc","mode":"managed","type":"google_folder_iam_member","name":"iam_osconfig_rollout_service_agent_nc","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"condition":[],"role":"roles/osconfig.rolloutServiceAgent"},"sensitive_values":{"condition":[]}},{"address":"google_folder_iam_member.iam_osconfig_service_agent","mode":"managed","type":"google_folder_iam_member","name":"iam_osconfig_service_agent","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"condition":[],"role":"roles/osconfig.serviceAgent"},"sensitive_values":{"condition":[]}},{"address":"google_folder_iam_member.iam_osconfig_service_agent_nc","mode":"managed","type":"google_folder_iam_member","name":"iam_osconfig_service_agent_nc","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"condition":[],"role":"roles/osconfig.serviceAgent"},"sensitive_values":{"condition":[]}},{"address":"google_folder_iam_member.iam_progressiverollout_service_agent","mode":"managed","type":"google_folder_iam_member","name":"iam_progressiverollout_service_agent","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"condition":[],"role":"roles/progressiverollout.serviceAgent"},"sensitive_values":{"condition":[]}},{"address":"google_folder_iam_member.iam_progressiverollout_service_agent_nc","mode":"managed","type":"google_folder_iam_member","name":"iam_progressiverollout_service_agent_nc","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"condition":[],"role":"roles/progressiverollout.serviceAgent"},"sensitive_values":{"condition":[]}},{"address":"google_folder_service_identity.osconfig_sa","mode":"managed","type":"google_folder_service_identity","name":"osconfig_sa","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"service":"osconfig.googleapis.com","timeouts":null},"sensitive_values":{}},{"address":"google_folder_service_identity.osconfig_sa_nc","mode":"managed","type":"google_folder_service_identity","name":"osconfig_sa_nc","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"service":"osconfig.googleapis.com","timeouts":null},"sensitive_values":{}},{"address":"google_folder_service_identity.ripple_sa","mode":"managed","type":"google_folder_service_identity","name":"ripple_sa","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"service":"progressiverollout.googleapis.com","timeouts":null},"sensitive_values":{}},{"address":"google_folder_service_identity.ripple_sa_nc","mode":"managed","type":"google_folder_service_identity","name":"ripple_sa_nc","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"service":"progressiverollout.googleapis.com","timeouts":null},"sensitive_values":{}},{"address":"google_os_config_v2_policy_orchestrator_for_folder.c","mode":"managed","type":"google_os_config_v2_policy_orchestrator_for_folder","name":"c","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"action":"UPSERT","description":null,"effective_labels":{"goog-terraform-provisioned":"true","state":"active"},"labels":{"state":"active"},"orchestrated_resource":[{"id":"test-orchestrated-resource-folder","os_policy_assignment_v1_payload":[{"description":null,"instance_filter":[{"all":null,"exclusion_labels":[],"inclusion_labels":[],"inventories":[{"os_short_name":"Debian","os_version":null}]}],"name":null,"os_policies":[{"allow_no_resource_group_match":null,"description":null,"id":"test-os-policy-folder","mode":"ENFORCEMENT","resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"id":"Nmap","pkg":[],"repository":[{"apt":[{"archive_type":"DEB","components":["main"],"distribution":"focal","gpg_key":null,"uri":"ppa:nmap/nmap"}],"goo":[],"yum":[],"zypper":[]}]}]}]}],"rollout":[{"disruption_budget":[{"fixed":null,"percent":100}],"min_wait_duration":"60s"}]}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":[""]}],"resource_hierarchy_selector":[]}]}],"policy_orchestrator_id":"po-folder","state":"ACTIVE","terraform_labels":{"goog-terraform-provisioned":"true","state":"active"},"timeouts":null},"sensitive_values":{"effective_labels":{},"labels":{},"orchestrated_resource":[{"os_policy_assignment_v1_payload":[{"instance_filter":[{"exclusion_labels":[],"inclusion_labels":[],"inventories":[{}]}],"os_policies":[{"resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"pkg":[],"repository":[{"apt":[{"components":[false]}],"goo":[],"yum":[],"zypper":[]}]}]}]}],"rollout":[{"disruption_budget":[{}]}]}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":[false]}],"resource_hierarchy_selector":[]}]}],"orchestration_state":[],"terraform_labels":{}}},{"address":"google_os_config_v2_policy_orchestrator_for_folder.nc","mode":"managed","type":"google_os_config_v2_policy_orchestrator_for_folder","name":"nc","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"action":"UPSERT","description":null,"effective_labels":{"goog-terraform-provisioned":"true","state":"active"},"labels":{"state":"active"},"orchestrated_resource":[{"id":"test-orchestrated-resource","os_policy_assignment_v1_payload":[{"description":null,"instance_filter":[{"all":null,"exclusion_labels":[],"inclusion_labels":[],"inventories":[{"os_short_name":"Windows","os_version":null}]}],"name":null,"os_policies":[{"allow_no_resource_group_match":null,"description":null,"id":"test-os-policy","mode":"VALIDATION","resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"id":"Nmap","pkg":[],"repository":[{"apt":[{"archive_type":"DEB_SRC","components":["main"],"distribution":"focal","gpg_key":null,"uri":"ppa:nmap/nmap"}],"goo":[],"yum":[],"zypper":[]}]}]}]}],"rollout":[{"disruption_budget":[{"fixed":null,"percent":100}],"min_wait_duration":"60s"}]}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":[""]}],"resource_hierarchy_selector":[]}]}],"policy_orchestrator_id":"po-folder","state":"ACTIVE","terraform_labels":{"goog-terraform-provisioned":"true","state":"active"},"timeouts":null},"sensitive_values":{"effective_labels":{},"labels":{},"orchestrated_resource":[{"os_policy_assignment_v1_payload":[{"instance_filter":[{"exclusion_labels":[],"inclusion_labels":[],"inventories":[{}]}],"os_policies":[{"resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"pkg":[],"repository":[{"apt":[{"components":[false]}],"goo":[],"yum":[],"zypper":[]}]}]}]}],"rollout":[{"disruption_budget":[{}]}]}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":[false]}],"resource_hierarchy_selector":[]}]}],"orchestration_state":[],"terraform_labels":{}}},{"address":"time_sleep.wait_30_sec","mode":"managed","type":"time_sleep","name":"wait_30_sec","provider_name":"registry.terraform.io/hashicorp/time","schema_version":0,"values":{"create_duration":"30s","destroy_duration":null,"triggers":null},"sensitive_values":{}},{"address":"time_sleep.wait_30_sec_nc","mode":"managed","type":"time_sleep","name":"wait_30_sec_nc","provider_name":"registry.terraform.io/hashicorp/time","schema_version":0,"values":{"create_duration":"30s","destroy_duration":null,"triggers":null},"sensitive_values":{}},{"address":"time_sleep.wait_3_min","mode":"managed","type":"time_sleep","name":"wait_3_min","provider_name":"registry.terraform.io/hashicorp/time","schema_version":0,"values":{"create_duration":"180s","destroy_duration":null,"triggers":null},"sensitive_values":{}},{"address":"time_sleep.wait_3_min_nc","mode":"managed","type":"time_sleep","name":"wait_3_min_nc","provider_name":"registry.terraform.io/hashicorp/time","schema_version":0,"values":{"create_duration":"180s","destroy_duration":null,"triggers":null},"sensitive_values":{}}]}},"resource_changes":[{"address":"google_folder.my_folder","mode":"managed","type":"google_folder","name":"my_folder","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"deletion_protection":false,"display_name":"po-folder","parent":"organizations/123456789","tags":null,"timeouts":null},"after_unknown":{"configured_capabilities":true,"create_time":true,"folder_id":true,"id":true,"lifecycle_state":true,"management_project":true,"name":true},"before_sensitive":false,"after_sensitive":{"configured_capabilities":[]}}},{"address":"google_folder.my_folder_nc","mode":"managed","type":"google_folder","name":"my_folder_nc","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"deletion_protection":false,"display_name":"po-folder","parent":"organizations/123456789","tags":null,"timeouts":null},"after_unknown":{"configured_capabilities":true,"create_time":true,"folder_id":true,"id":true,"lifecycle_state":true,"management_project":true,"name":true},"before_sensitive":false,"after_sensitive":{"configured_capabilities":[]}}},{"address":"google_folder_iam_member.iam_osconfig_rollout_service_agent","mode":"managed","type":"google_folder_iam_member","name":"iam_osconfig_rollout_service_agent","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"condition":[],"role":"roles/osconfig.rolloutServiceAgent"},"after_unknown":{"condition":[],"etag":true,"folder":true,"id":true,"member":true},"before_sensitive":false,"after_sensitive":{"condition":[]}}},{"address":"google_folder_iam_member.iam_osconfig_rollout_service_agent_nc","mode":"managed","type":"google_folder_iam_member","name":"iam_osconfig_rollout_service_agent_nc","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"condition":[],"role":"roles/osconfig.rolloutServiceAgent"},"after_unknown":{"condition":[],"etag":true,"folder":true,"id":true,"member":true},"before_sensitive":false,"after_sensitive":{"condition":[]}}},{"address":"google_folder_iam_member.iam_osconfig_service_agent","mode":"managed","type":"google_folder_iam_member","name":"iam_osconfig_service_agent","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"condition":[],"role":"roles/osconfig.serviceAgent"},"after_unknown":{"condition":[],"etag":true,"folder":true,"id":true,"member":true},"before_sensitive":false,"after_sensitive":{"condition":[]}}},{"address":"google_folder_iam_member.iam_osconfig_service_agent_nc","mode":"managed","type":"google_folder_iam_member","name":"iam_osconfig_service_agent_nc","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"condition":[],"role":"roles/osconfig.serviceAgent"},"after_unknown":{"condition":[],"etag":true,"folder":true,"id":true,"member":true},"before_sensitive":false,"after_sensitive":{"condition":[]}}},{"address":"google_folder_iam_member.iam_progressiverollout_service_agent","mode":"managed","type":"google_folder_iam_member","name":"iam_progressiverollout_service_agent","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"condition":[],"role":"roles/progressiverollout.serviceAgent"},"after_unknown":{"condition":[],"etag":true,"folder":true,"id":true,"member":true},"before_sensitive":false,"after_sensitive":{"condition":[]}}},{"address":"google_folder_iam_member.iam_progressiverollout_service_agent_nc","mode":"managed","type":"google_folder_iam_member","name":"iam_progressiverollout_service_agent_nc","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"condition":[],"role":"roles/progressiverollout.serviceAgent"},"after_unknown":{"condition":[],"etag":true,"folder":true,"id":true,"member":true},"before_sensitive":false,"after_sensitive":{"condition":[]}}},{"address":"google_folder_service_identity.osconfig_sa","mode":"managed","type":"google_folder_service_identity","name":"osconfig_sa","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"service":"osconfig.googleapis.com","timeouts":null},"after_unknown":{"email":true,"folder":true,"id":true,"member":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"google_folder_service_identity.osconfig_sa_nc","mode":"managed","type":"google_folder_service_identity","name":"osconfig_sa_nc","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"service":"osconfig.googleapis.com","timeouts":null},"after_unknown":{"email":true,"folder":true,"id":true,"member":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"google_folder_service_identity.ripple_sa","mode":"managed","type":"google_folder_service_identity","name":"ripple_sa","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"service":"progressiverollout.googleapis.com","timeouts":null},"after_unknown":{"email":true,"folder":true,"id":true,"member":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"google_folder_service_identity.ripple_sa_nc","mode":"managed","type":"google_folder_service_identity","name":"ripple_sa_nc","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"service":"progressiverollout.googleapis.com","timeouts":null},"after_unknown":{"email":true,"folder":true,"id":true,"member":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"google_os_config_v2_policy_orchestrator_for_folder.c","mode":"managed","type":"google_os_config_v2_policy_orchestrator_for_folder","name":"c","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"action":"UPSERT","description":null,"effective_labels":{"goog-terraform-provisioned":"true","state":"active"},"labels":{"state":"active"},"orchestrated_resource":[{"id":"test-orchestrated-resource-folder","os_policy_assignment_v1_payload":[{"description":null,"instance_filter":[{"all":null,"exclusion_labels":[],"inclusion_labels":[],"inventories":[{"os_short_name":"Debian","os_version":null}]}],"name":null,"os_policies":[{"allow_no_resource_group_match":null,"description":null,"id":"test-os-policy-folder","mode":"ENFORCEMENT","resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"id":"Nmap","pkg":[],"repository":[{"apt":[{"archive_type":"DEB","components":["main"],"distribution":"focal","gpg_key":null,"uri":"ppa:nmap/nmap"}],"goo":[],"yum":[],"zypper":[]}]}]}]}],"rollout":[{"disruption_budget":[{"fixed":null,"percent":100}],"min_wait_duration":"60s"}]}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":[""]}],"resource_hierarchy_selector":[]}]}],"policy_orchestrator_id":"po-folder","state":"ACTIVE","terraform_labels":{"goog-terraform-provisioned":"true","state":"active"},"timeouts":null},"after_unknown":{"create_time":true,"effective_labels":{},"etag":true,"folder_id":true,"id":true,"labels":{},"name":true,"orchestrated_resource":[{"os_policy_assignment_v1_payload":[{"baseline":true,"deleted":true,"etag":true,"instance_filter":[{"exclusion_labels":[],"inclusion_labels":[],"inventories":[{}]}],"os_policies":[{"resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"pkg":[],"repository":[{"apt":[{"components":[false]}],"goo":[],"yum":[],"zypper":[]}]}]}]}],"reconciling":true,"revision_create_time":true,"revision_id":true,"rollout":[{"disruption_budget":[{}]}],"rollout_state":true,"uid":true}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":[false]}],"resource_hierarchy_selector":[]}]}],"orchestration_state":true,"reconciling":true,"terraform_labels":{},"update_time":true},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"labels":{},"orchestrated_resource":[{"os_policy_assignment_v1_payload":[{"instance_filter":[{"exclusion_labels":[],"inclusion_labels":[],"inventories":[{}]}],"os_policies":[{"resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"pkg":[],"repository":[{"apt":[{"components":[false]}],"goo":[],"yum":[],"zypper":[]}]}]}]}],"rollout":[{"disruption_budget":[{}]}]}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":[false]}],"resource_hierarchy_selector":[]}]}],"orchestration_state":[],"terraform_labels":{}}}},{"address":"google_os_config_v2_policy_orchestrator_for_folder.nc","mode":"managed","type":"google_os_config_v2_policy_orchestrator_for_folder","name":"nc","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"action":"UPSERT","description":null,"effective_labels":{"goog-terraform-provisioned":"true","state":"active"},"labels":{"state":"active"},"orchestrated_resource":[{"id":"test-orchestrated-resource","os_policy_assignment_v1_payload":[{"description":null,"instance_filter":[{"all":null,"exclusion_labels":[],"inclusion_labels":[],"inventories":[{"os_short_name":"Windows","os_version":null}]}],"name":null,"os_policies":[{"allow_no_resource_group_match":null,"description":null,"id":"test-os-policy","mode":"VALIDATION","resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"id":"Nmap","pkg":[],"repository":[{"apt":[{"archive_type":"DEB_SRC","components":["main"],"distribution":"focal","gpg_key":null,"uri":"ppa:nmap/nmap"}],"goo":[],"yum":[],"zypper":[]}]}]}]}],"rollout":[{"disruption_budget":[{"fixed":null,"percent":100}],"min_wait_duration":"60s"}]}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":[""]}],"resource_hierarchy_selector":[]}]}],"policy_orchestrator_id":"po-folder","state":"ACTIVE","terraform_labels":{"goog-terraform-provisioned":"true","state":"active"},"timeouts":null},"after_unknown":{"create_time":true,"effective_labels":{},"etag":true,"folder_id":true,"id":true,"labels":{},"name":true,"orchestrated_resource":[{"os_policy_assignment_v1_payload":[{"baseline":true,"deleted":true,"etag":true,"instance_filter":[{"exclusion_labels":[],"inclusion_labels":[],"inventories":[{}]}],"os_policies":[{"resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"pkg":[],"repository":[{"apt":[{"components":[false]}],"goo":[],"yum":[],"zypper":[]}]}]}]}],"reconciling":true,"revision_create_time":true,"revision_id":true,"rollout":[{"disruption_budget":[{}]}],"rollout_state":true,"uid":true}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":[false]}],"resource_hierarchy_selector":[]}]}],"orchestration_state":true,"reconciling":true,"terraform_labels":{},"update_time":true},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"labels":{},"orchestrated_resource":[{"os_policy_assignment_v1_payload":[{"instance_filter":[{"exclusion_labels":[],"inclusion_labels":[],"inventories":[{}]}],"os_policies":[{"resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"pkg":[],"repository":[{"apt":[{"components":[false]}],"goo":[],"yum":[],"zypper":[]}]}]}]}],"rollout":[{"disruption_budget":[{}]}]}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":[false]}],"resource_hierarchy_selector":[]}]}],"orchestration_state":[],"terraform_labels":{}}}},{"address":"time_sleep.wait_30_sec","mode":"managed","type":"time_sleep","name":"wait_30_sec","provider_name":"registry.terraform.io/hashicorp/time","change":{"actions":["create"],"before":null,"after":{"create_duration":"30s","destroy_duration":null,"triggers":null},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"time_sleep.wait_30_sec_nc","mode":"managed","type":"time_sleep","name":"wait_30_sec_nc","provider_name":"registry.terraform.io/hashicorp/time","change":{"actions":["create"],"before":null,"after":{"create_duration":"30s","destroy_duration":null,"triggers":null},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"time_sleep.wait_3_min","mode":"managed","type":"time_sleep","name":"wait_3_min","provider_name":"registry.terraform.io/hashicorp/time","change":{"actions":["create"],"before":null,"after":{"create_duration":"180s","destroy_duration":null,"triggers":null},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"time_sleep.wait_3_min_nc","mode":"managed","type":"time_sleep","name":"wait_3_min_nc","provider_name":"registry.terraform.io/hashicorp/time","change":{"actions":["create"],"before":null,"after":{"create_duration":"180s","destroy_duration":null,"triggers":null},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{}}}],"configuration":{"provider_config":{"google-beta":{"name":"google-beta","full_name":"registry.terraform.io/hashicorp/google-beta"},"time":{"name":"time","full_name":"registry.terraform.io/hashicorp/time"}},"root_module":{"resources":[{"address":"google_folder.my_folder","mode":"managed","type":"google_folder","name":"my_folder","provider_config_key":"google-beta","expressions":{"deletion_protection":{"constant_value":false},"display_name":{"constant_value":"po-folder"},"parent":{"constant_value":"organizations/123456789"}},"schema_version":0},{"address":"google_folder.my_folder_nc","mode":"managed","type":"google_folder","name":"my_folder_nc","provider_config_key":"google-beta","expressions":{"deletion_protection":{"constant_value":false},"display_name":{"constant_value":"po-folder"},"parent":{"constant_value":"organizations/123456789"}},"schema_version":0},{"address":"google_folder_iam_member.iam_osconfig_rollout_service_agent","mode":"managed","type":"google_folder_iam_member","name":"iam_osconfig_rollout_service_agent","provider_config_key":"google-beta","expressions":{"folder":{"references":["google_folder.my_folder.folder_id","google_folder.my_folder"]},"member":{"references":["google_folder.my_folder.folder_id","google_folder.my_folder"]},"role":{"constant_value":"roles/osconfig.rolloutServiceAgent"}},"schema_version":0,"depends_on":["google_folder_iam_member.iam_osconfig_service_agent"]},{"address":"google_folder_iam_member.iam_osconfig_rollout_service_agent_nc","mode":"managed","type":"google_folder_iam_member","name":"iam_osconfig_rollout_service_agent_nc","provider_config_key":"google-beta","expressions":{"folder":{"references":["google_folder.my_folder.folder_id","google_folder.my_folder"]},"member":{"references":["google_folder.my_folder.folder_id","google_folder.my_folder"]},"role":{"constant_value":"roles/osconfig.rolloutServiceAgent"}},"schema_version":0,"depends_on":["google_folder_iam_member.iam_osconfig_service_agent"]},{"address":"google_folder_iam_member.iam_osconfig_service_agent","mode":"managed","type":"google_folder_iam_member","name":"iam_osconfig_service_agent","provider_config_key":"google-beta","expressions":{"folder":{"references":["google_folder.my_folder.folder_id","google_folder.my_folder"]},"member":{"references":["google_folder_service_identity.osconfig_sa.member","google_folder_service_identity.osconfig_sa"]},"role":{"constant_value":"roles/osconfig.serviceAgent"}},"schema_version":0,"depends_on":["time_sleep.wait_30_sec"]},{"address":"google_folder_iam_member.iam_osconfig_service_agent_nc","mode":"managed","type":"google_folder_iam_member","name":"iam_osconfig_service_agent_nc","provider_config_key":"google-beta","expressions":{"folder":{"references":["google_folder.my_folder.folder_id","google_folder.my_folder"]},"member":{"references":["google_folder_service_identity.osconfig_sa.member","google_folder_service_identity.osconfig_sa"]},"role":{"constant_value":"roles/osconfig.serviceAgent"}},"schema_version":0,"depends_on":["time_sleep.wait_30_sec"]},{"address":"google_folder_iam_member.iam_progressiverollout_service_agent","mode":"managed","type":"google_folder_iam_member","name":"iam_progressiverollout_service_agent","provider_config_key":"google-beta","expressions":{"folder":{"references":["google_folder.my_folder.folder_id","google_folder.my_folder"]},"member":{"references":["google_folder_service_identity.ripple_sa.member","google_folder_service_identity.ripple_sa"]},"role":{"constant_value":"roles/progressiverollout.serviceAgent"}},"schema_version":0,"depends_on":["google_folder_iam_member.iam_osconfig_rollout_service_agent"]},{"address":"google_folder_iam_member.iam_progressiverollout_service_agent_nc","mode":"managed","type":"google_folder_iam_member","name":"iam_progressiverollout_service_agent_nc","provider_config_key":"google-beta","expressions":{"folder":{"references":["google_folder.my_folder.folder_id","google_folder.my_folder"]},"member":{"references":["google_folder_service_identity.ripple_sa.member","google_folder_service_identity.ripple_sa"]},"role":{"constant_value":"roles/progressiverollout.serviceAgent"}},"schema_version":0,"depends_on":["google_folder_iam_member.iam_osconfig_rollout_service_agent"]},{"address":"google_folder_service_identity.osconfig_sa","mode":"managed","type":"google_folder_service_identity","name":"osconfig_sa","provider_config_key":"google-beta","expressions":{"folder":{"references":["google_folder.my_folder.folder_id","google_folder.my_folder"]},"service":{"constant_value":"osconfig.googleapis.com"}},"schema_version":0},{"address":"google_folder_service_identity.osconfig_sa_nc","mode":"managed","type":"google_folder_service_identity","name":"osconfig_sa_nc","provider_config_key":"google-beta","expressions":{"folder":{"references":["google_folder.my_folder.folder_id","google_folder.my_folder"]},"service":{"constant_value":"osconfig.googleapis.com"}},"schema_version":0},{"address":"google_folder_service_identity.ripple_sa","mode":"managed","type":"google_folder_service_identity","name":"ripple_sa","provider_config_key":"google-beta","expressions":{"folder":{"references":["google_folder.my_folder.folder_id","google_folder.my_folder"]},"service":{"constant_value":"progressiverollout.googleapis.com"}},"schema_version":0},{"address":"google_folder_service_identity.ripple_sa_nc","mode":"managed","type":"google_folder_service_identity","name":"ripple_sa_nc","provider_config_key":"google-beta","expressions":{"folder":{"references":["google_folder.my_folder.folder_id","google_folder.my_folder"]},"service":{"constant_value":"progressiverollout.googleapis.com"}},"schema_version":0},{"address":"google_os_config_v2_policy_orchestrator_for_folder.c","mode":"managed","type":"google_os_config_v2_policy_orchestrator_for_folder","name":"c","provider_config_key":"google-beta","expressions":{"action":{"constant_value":"UPSERT"},"folder_id":{"references":["google_folder.my_folder.folder_id","google_folder.my_folder"]},"labels":{"constant_value":{"state":"active"}},"orchestrated_resource":[{"id":{"constant_value":"test-orchestrated-resource-folder"},"os_policy_assignment_v1_payload":[{"instance_filter":[{"inventories":[{"os_short_name":{"constant_value":"Debian"}}]}],"os_policies":[{"id":{"constant_value":"test-os-policy-folder"},"mode":{"constant_value":"ENFORCEMENT"},"resource_groups":[{"resources":[{"id":{"constant_value":"Nmap"},"repository":[{"apt":[{"archive_type":{"constant_value":"DEB"},"components":{"constant_value":["main"]},"distribution":{"constant_value":"focal"},"uri":{"constant_value":"ppa:nmap/nmap"}}]}]}]}]}],"rollout":[{"disruption_budget":[{"percent":{"constant_value":100}}],"min_wait_duration":{"constant_value":"60s"}}]}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":{"constant_value":[""]}}]}]}],"policy_orchestrator_id":{"constant_value":"po-folder"},"state":{"constant_value":"ACTIVE"}},"schema_version":0,"depends_on":["time_sleep.wait_3_min"]},{"address":"google_os_config_v2_policy_orchestrator_for_folder.nc","mode":"managed","type":"google_os_config_v2_policy_orchestrator_for_folder","name":"nc","provider_config_key":"google-beta","expressions":{"action":{"constant_value":"UPSERT"},"folder_id":{"references":["google_folder.my_folder.folder_id","google_folder.my_folder"]},"labels":{"constant_value":{"state":"active"}},"orchestrated_resource":[{"id":{"constant_value":"test-orchestrated-resource"},"os_policy_assignment_v1_payload":[{"instance_filter":[{"inventories":[{"os_short_name":{"constant_value":"Windows"}}]}],"os_policies":[{"id":{"constant_value":"test-os-policy"},"mode":{"constant_value":"VALIDATION"},"resource_groups":[{"resources":[{"id":{"constant_value":"Nmap"},"repository":[{"apt":[{"archive_type":{"constant_value":"DEB_SRC"},"components":{"constant_value":["main"]},"distribution":{"constant_value":"focal"},"uri":{"constant_value":"ppa:nmap/nmap"}}]}]}]}]}],"rollout":[{"disruption_budget":[{"percent":{"constant_value":100}}],"min_wait_duration":{"constant_value":"60s"}}]}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":{"constant_value":[""]}}]}]}],"policy_orchestrator_id":{"constant_value":"po-folder"},"state":{"constant_value":"ACTIVE"}},"schema_version":0,"depends_on":["time_sleep.wait_3_min"]},{"address":"time_sleep.wait_30_sec","mode":"managed","type":"time_sleep","name":"wait_30_sec","provider_config_key":"time","expressions":{"create_duration":{"constant_value":"30s"}},"schema_version":0,"depends_on":["google_folder_service_identity.osconfig_sa","google_folder_service_identity.ripple_sa"]},{"address":"time_sleep.wait_30_sec_nc","mode":"managed","type":"time_sleep","name":"wait_30_sec_nc","provider_config_key":"time","expressions":{"create_duration":{"constant_value":"30s"}},"schema_version":0,"depends_on":["google_folder_service_identity.osconfig_sa","google_folder_service_identity.ripple_sa"]},{"address":"time_sleep.wait_3_min","mode":"managed","type":"time_sleep","name":"wait_3_min","provider_config_key":"time","expressions":{"create_duration":{"constant_value":"180s"}},"schema_version":0,"depends_on":["google_folder_iam_member.iam_progressiverollout_service_agent"]},{"address":"time_sleep.wait_3_min_nc","mode":"managed","type":"time_sleep","name":"wait_3_min_nc","provider_config_key":"time","expressions":{"create_duration":{"constant_value":"180s"}},"schema_version":0,"depends_on":["google_folder_iam_member.iam_progressiverollout_service_agent"]}]}},"relevant_attributes":[{"resource":"google_folder.my_folder","attribute":["folder_id"]},{"resource":"google_folder_service_identity.osconfig_sa","attribute":["member"]},{"resource":"google_folder_service_identity.ripple_sa","attribute":["member"]}],"timestamp":"2026-02-11T03:46:11Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/os_config_v2/policy_orchestrator_for_folder/orchestration_scope/c.tf b/inputs/gcp/os_config_v2/policy_orchestrator_for_folder/orchestration_scope/c.tf index 73a59fea8..e02dd3a34 100644 --- a/inputs/gcp/os_config_v2/policy_orchestrator_for_folder/orchestration_scope/c.tf +++ b/inputs/gcp/os_config_v2/policy_orchestrator_for_folder/orchestration_scope/c.tf @@ -99,6 +99,7 @@ resource "google_os_config_v2_policy_orchestrator_for_folder" "c" { } labels = { state = "active" + environment = "test" } orchestration_scope { selectors { diff --git a/inputs/gcp/os_config_v2/policy_orchestrator_for_folder/orchestration_scope/plan.json b/inputs/gcp/os_config_v2/policy_orchestrator_for_folder/orchestration_scope/plan.json new file mode 100644 index 000000000..80a31fbb1 --- /dev/null +++ b/inputs/gcp/os_config_v2/policy_orchestrator_for_folder/orchestration_scope/plan.json @@ -0,0 +1 @@ +{"format_version":"1.2","terraform_version":"1.13.3","planned_values":{"root_module":{"resources":[{"address":"google_folder.my_folder","mode":"managed","type":"google_folder","name":"my_folder","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"deletion_protection":false,"display_name":"po-folder","parent":"organizations/123456789","tags":null,"timeouts":null},"sensitive_values":{"configured_capabilities":[]}},{"address":"google_folder.my_folder_nc","mode":"managed","type":"google_folder","name":"my_folder_nc","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"deletion_protection":false,"display_name":"po-folder","parent":"organizations/123456789","tags":null,"timeouts":null},"sensitive_values":{"configured_capabilities":[]}},{"address":"google_folder_iam_member.iam_osconfig_rollout_service_agent","mode":"managed","type":"google_folder_iam_member","name":"iam_osconfig_rollout_service_agent","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"condition":[],"role":"roles/osconfig.rolloutServiceAgent"},"sensitive_values":{"condition":[]}},{"address":"google_folder_iam_member.iam_osconfig_rollout_service_agent_nc","mode":"managed","type":"google_folder_iam_member","name":"iam_osconfig_rollout_service_agent_nc","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"condition":[],"role":"roles/osconfig.rolloutServiceAgent"},"sensitive_values":{"condition":[]}},{"address":"google_folder_iam_member.iam_osconfig_service_agent","mode":"managed","type":"google_folder_iam_member","name":"iam_osconfig_service_agent","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"condition":[],"role":"roles/osconfig.serviceAgent"},"sensitive_values":{"condition":[]}},{"address":"google_folder_iam_member.iam_osconfig_service_agent_nc","mode":"managed","type":"google_folder_iam_member","name":"iam_osconfig_service_agent_nc","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"condition":[],"role":"roles/osconfig.serviceAgent"},"sensitive_values":{"condition":[]}},{"address":"google_folder_iam_member.iam_progressiverollout_service_agent","mode":"managed","type":"google_folder_iam_member","name":"iam_progressiverollout_service_agent","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"condition":[],"role":"roles/progressiverollout.serviceAgent"},"sensitive_values":{"condition":[]}},{"address":"google_folder_iam_member.iam_progressiverollout_service_agent_nc","mode":"managed","type":"google_folder_iam_member","name":"iam_progressiverollout_service_agent_nc","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"condition":[],"role":"roles/progressiverollout.serviceAgent"},"sensitive_values":{"condition":[]}},{"address":"google_folder_service_identity.osconfig_sa","mode":"managed","type":"google_folder_service_identity","name":"osconfig_sa","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"service":"osconfig.googleapis.com","timeouts":null},"sensitive_values":{}},{"address":"google_folder_service_identity.osconfig_sa_nc","mode":"managed","type":"google_folder_service_identity","name":"osconfig_sa_nc","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"service":"osconfig.googleapis.com","timeouts":null},"sensitive_values":{}},{"address":"google_folder_service_identity.ripple_sa","mode":"managed","type":"google_folder_service_identity","name":"ripple_sa","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"service":"progressiverollout.googleapis.com","timeouts":null},"sensitive_values":{}},{"address":"google_folder_service_identity.ripple_sa_nc","mode":"managed","type":"google_folder_service_identity","name":"ripple_sa_nc","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"service":"progressiverollout.googleapis.com","timeouts":null},"sensitive_values":{}},{"address":"google_os_config_v2_policy_orchestrator_for_folder.c","mode":"managed","type":"google_os_config_v2_policy_orchestrator_for_folder","name":"c","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"action":"DELETE","description":null,"effective_labels":{"environment":"test","goog-terraform-provisioned":"true","state":"active"},"labels":{"environment":"test","state":"active"},"orchestrated_resource":[{"id":"test-orchestrated-resource-folder","os_policy_assignment_v1_payload":[{"description":null,"instance_filter":[{"all":null,"exclusion_labels":[],"inclusion_labels":[],"inventories":[{"os_short_name":"Debian","os_version":null}]}],"name":null,"os_policies":[{"allow_no_resource_group_match":null,"description":null,"id":"test-os-policy-folder","mode":"ENFORCEMENT","resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"id":"Nmap","pkg":[],"repository":[{"apt":[{"archive_type":"DEB","components":["main"],"distribution":"focal","gpg_key":null,"uri":"ppa:nmap/nmap"}],"goo":[],"yum":[],"zypper":[]}]}]}]}],"rollout":[{"disruption_budget":[{"fixed":null,"percent":100}],"min_wait_duration":"60s"}]}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":["Sydney","Melbourne"]}],"resource_hierarchy_selector":[]}]}],"policy_orchestrator_id":"po-folder","state":"STOPPED","terraform_labels":{"environment":"test","goog-terraform-provisioned":"true","state":"active"},"timeouts":null},"sensitive_values":{"effective_labels":{},"labels":{},"orchestrated_resource":[{"os_policy_assignment_v1_payload":[{"instance_filter":[{"exclusion_labels":[],"inclusion_labels":[],"inventories":[{}]}],"os_policies":[{"resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"pkg":[],"repository":[{"apt":[{"components":[false]}],"goo":[],"yum":[],"zypper":[]}]}]}]}],"rollout":[{"disruption_budget":[{}]}]}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":[false,false]}],"resource_hierarchy_selector":[]}]}],"orchestration_state":[],"terraform_labels":{}}},{"address":"google_os_config_v2_policy_orchestrator_for_folder.nc","mode":"managed","type":"google_os_config_v2_policy_orchestrator_for_folder","name":"nc","provider_name":"registry.terraform.io/hashicorp/google-beta","schema_version":0,"values":{"action":"DELETE","description":null,"effective_labels":{"goog-terraform-provisioned":"true","state":"active"},"labels":{"state":"active"},"orchestrated_resource":[{"id":"test-orchestrated-resource","os_policy_assignment_v1_payload":[{"description":null,"instance_filter":[{"all":null,"exclusion_labels":[],"inclusion_labels":[],"inventories":[{"os_short_name":"Windows","os_version":null}]}],"name":null,"os_policies":[{"allow_no_resource_group_match":null,"description":null,"id":"test-os-policy","mode":"VALIDATION","resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"id":"Nmap","pkg":[],"repository":[{"apt":[{"archive_type":"DEB_SRC","components":["main"],"distribution":"focal","gpg_key":null,"uri":"ppa:nmap/nmap"}],"goo":[],"yum":[],"zypper":[]}]}]}]}],"rollout":[{"disruption_budget":[{"fixed":null,"percent":100}],"min_wait_duration":"60s"}]}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":["Mumbai","Hyderabad","Berlin","Frankfurt"]}],"resource_hierarchy_selector":[]}]}],"policy_orchestrator_id":"po-folder","state":"ACTIVE","terraform_labels":{"goog-terraform-provisioned":"true","state":"active"},"timeouts":null},"sensitive_values":{"effective_labels":{},"labels":{},"orchestrated_resource":[{"os_policy_assignment_v1_payload":[{"instance_filter":[{"exclusion_labels":[],"inclusion_labels":[],"inventories":[{}]}],"os_policies":[{"resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"pkg":[],"repository":[{"apt":[{"components":[false]}],"goo":[],"yum":[],"zypper":[]}]}]}]}],"rollout":[{"disruption_budget":[{}]}]}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":[false,false,false,false]}],"resource_hierarchy_selector":[]}]}],"orchestration_state":[],"terraform_labels":{}}},{"address":"time_sleep.wait_30_sec","mode":"managed","type":"time_sleep","name":"wait_30_sec","provider_name":"registry.terraform.io/hashicorp/time","schema_version":0,"values":{"create_duration":"30s","destroy_duration":null,"triggers":null},"sensitive_values":{}},{"address":"time_sleep.wait_30_sec_nc","mode":"managed","type":"time_sleep","name":"wait_30_sec_nc","provider_name":"registry.terraform.io/hashicorp/time","schema_version":0,"values":{"create_duration":"30s","destroy_duration":null,"triggers":null},"sensitive_values":{}},{"address":"time_sleep.wait_3_min","mode":"managed","type":"time_sleep","name":"wait_3_min","provider_name":"registry.terraform.io/hashicorp/time","schema_version":0,"values":{"create_duration":"180s","destroy_duration":null,"triggers":null},"sensitive_values":{}},{"address":"time_sleep.wait_3_min_nc","mode":"managed","type":"time_sleep","name":"wait_3_min_nc","provider_name":"registry.terraform.io/hashicorp/time","schema_version":0,"values":{"create_duration":"180s","destroy_duration":null,"triggers":null},"sensitive_values":{}}]}},"resource_changes":[{"address":"google_folder.my_folder","mode":"managed","type":"google_folder","name":"my_folder","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"deletion_protection":false,"display_name":"po-folder","parent":"organizations/123456789","tags":null,"timeouts":null},"after_unknown":{"configured_capabilities":true,"create_time":true,"folder_id":true,"id":true,"lifecycle_state":true,"management_project":true,"name":true},"before_sensitive":false,"after_sensitive":{"configured_capabilities":[]}}},{"address":"google_folder.my_folder_nc","mode":"managed","type":"google_folder","name":"my_folder_nc","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"deletion_protection":false,"display_name":"po-folder","parent":"organizations/123456789","tags":null,"timeouts":null},"after_unknown":{"configured_capabilities":true,"create_time":true,"folder_id":true,"id":true,"lifecycle_state":true,"management_project":true,"name":true},"before_sensitive":false,"after_sensitive":{"configured_capabilities":[]}}},{"address":"google_folder_iam_member.iam_osconfig_rollout_service_agent","mode":"managed","type":"google_folder_iam_member","name":"iam_osconfig_rollout_service_agent","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"condition":[],"role":"roles/osconfig.rolloutServiceAgent"},"after_unknown":{"condition":[],"etag":true,"folder":true,"id":true,"member":true},"before_sensitive":false,"after_sensitive":{"condition":[]}}},{"address":"google_folder_iam_member.iam_osconfig_rollout_service_agent_nc","mode":"managed","type":"google_folder_iam_member","name":"iam_osconfig_rollout_service_agent_nc","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"condition":[],"role":"roles/osconfig.rolloutServiceAgent"},"after_unknown":{"condition":[],"etag":true,"folder":true,"id":true,"member":true},"before_sensitive":false,"after_sensitive":{"condition":[]}}},{"address":"google_folder_iam_member.iam_osconfig_service_agent","mode":"managed","type":"google_folder_iam_member","name":"iam_osconfig_service_agent","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"condition":[],"role":"roles/osconfig.serviceAgent"},"after_unknown":{"condition":[],"etag":true,"folder":true,"id":true,"member":true},"before_sensitive":false,"after_sensitive":{"condition":[]}}},{"address":"google_folder_iam_member.iam_osconfig_service_agent_nc","mode":"managed","type":"google_folder_iam_member","name":"iam_osconfig_service_agent_nc","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"condition":[],"role":"roles/osconfig.serviceAgent"},"after_unknown":{"condition":[],"etag":true,"folder":true,"id":true,"member":true},"before_sensitive":false,"after_sensitive":{"condition":[]}}},{"address":"google_folder_iam_member.iam_progressiverollout_service_agent","mode":"managed","type":"google_folder_iam_member","name":"iam_progressiverollout_service_agent","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"condition":[],"role":"roles/progressiverollout.serviceAgent"},"after_unknown":{"condition":[],"etag":true,"folder":true,"id":true,"member":true},"before_sensitive":false,"after_sensitive":{"condition":[]}}},{"address":"google_folder_iam_member.iam_progressiverollout_service_agent_nc","mode":"managed","type":"google_folder_iam_member","name":"iam_progressiverollout_service_agent_nc","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"condition":[],"role":"roles/progressiverollout.serviceAgent"},"after_unknown":{"condition":[],"etag":true,"folder":true,"id":true,"member":true},"before_sensitive":false,"after_sensitive":{"condition":[]}}},{"address":"google_folder_service_identity.osconfig_sa","mode":"managed","type":"google_folder_service_identity","name":"osconfig_sa","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"service":"osconfig.googleapis.com","timeouts":null},"after_unknown":{"email":true,"folder":true,"id":true,"member":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"google_folder_service_identity.osconfig_sa_nc","mode":"managed","type":"google_folder_service_identity","name":"osconfig_sa_nc","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"service":"osconfig.googleapis.com","timeouts":null},"after_unknown":{"email":true,"folder":true,"id":true,"member":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"google_folder_service_identity.ripple_sa","mode":"managed","type":"google_folder_service_identity","name":"ripple_sa","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"service":"progressiverollout.googleapis.com","timeouts":null},"after_unknown":{"email":true,"folder":true,"id":true,"member":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"google_folder_service_identity.ripple_sa_nc","mode":"managed","type":"google_folder_service_identity","name":"ripple_sa_nc","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"service":"progressiverollout.googleapis.com","timeouts":null},"after_unknown":{"email":true,"folder":true,"id":true,"member":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"google_os_config_v2_policy_orchestrator_for_folder.c","mode":"managed","type":"google_os_config_v2_policy_orchestrator_for_folder","name":"c","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"action":"DELETE","description":null,"effective_labels":{"environment":"test","goog-terraform-provisioned":"true","state":"active"},"labels":{"environment":"test","state":"active"},"orchestrated_resource":[{"id":"test-orchestrated-resource-folder","os_policy_assignment_v1_payload":[{"description":null,"instance_filter":[{"all":null,"exclusion_labels":[],"inclusion_labels":[],"inventories":[{"os_short_name":"Debian","os_version":null}]}],"name":null,"os_policies":[{"allow_no_resource_group_match":null,"description":null,"id":"test-os-policy-folder","mode":"ENFORCEMENT","resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"id":"Nmap","pkg":[],"repository":[{"apt":[{"archive_type":"DEB","components":["main"],"distribution":"focal","gpg_key":null,"uri":"ppa:nmap/nmap"}],"goo":[],"yum":[],"zypper":[]}]}]}]}],"rollout":[{"disruption_budget":[{"fixed":null,"percent":100}],"min_wait_duration":"60s"}]}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":["Sydney","Melbourne"]}],"resource_hierarchy_selector":[]}]}],"policy_orchestrator_id":"po-folder","state":"STOPPED","terraform_labels":{"environment":"test","goog-terraform-provisioned":"true","state":"active"},"timeouts":null},"after_unknown":{"create_time":true,"effective_labels":{},"etag":true,"folder_id":true,"id":true,"labels":{},"name":true,"orchestrated_resource":[{"os_policy_assignment_v1_payload":[{"baseline":true,"deleted":true,"etag":true,"instance_filter":[{"exclusion_labels":[],"inclusion_labels":[],"inventories":[{}]}],"os_policies":[{"resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"pkg":[],"repository":[{"apt":[{"components":[false]}],"goo":[],"yum":[],"zypper":[]}]}]}]}],"reconciling":true,"revision_create_time":true,"revision_id":true,"rollout":[{"disruption_budget":[{}]}],"rollout_state":true,"uid":true}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":[false,false]}],"resource_hierarchy_selector":[]}]}],"orchestration_state":true,"reconciling":true,"terraform_labels":{},"update_time":true},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"labels":{},"orchestrated_resource":[{"os_policy_assignment_v1_payload":[{"instance_filter":[{"exclusion_labels":[],"inclusion_labels":[],"inventories":[{}]}],"os_policies":[{"resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"pkg":[],"repository":[{"apt":[{"components":[false]}],"goo":[],"yum":[],"zypper":[]}]}]}]}],"rollout":[{"disruption_budget":[{}]}]}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":[false,false]}],"resource_hierarchy_selector":[]}]}],"orchestration_state":[],"terraform_labels":{}}}},{"address":"google_os_config_v2_policy_orchestrator_for_folder.nc","mode":"managed","type":"google_os_config_v2_policy_orchestrator_for_folder","name":"nc","provider_name":"registry.terraform.io/hashicorp/google-beta","change":{"actions":["create"],"before":null,"after":{"action":"DELETE","description":null,"effective_labels":{"goog-terraform-provisioned":"true","state":"active"},"labels":{"state":"active"},"orchestrated_resource":[{"id":"test-orchestrated-resource","os_policy_assignment_v1_payload":[{"description":null,"instance_filter":[{"all":null,"exclusion_labels":[],"inclusion_labels":[],"inventories":[{"os_short_name":"Windows","os_version":null}]}],"name":null,"os_policies":[{"allow_no_resource_group_match":null,"description":null,"id":"test-os-policy","mode":"VALIDATION","resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"id":"Nmap","pkg":[],"repository":[{"apt":[{"archive_type":"DEB_SRC","components":["main"],"distribution":"focal","gpg_key":null,"uri":"ppa:nmap/nmap"}],"goo":[],"yum":[],"zypper":[]}]}]}]}],"rollout":[{"disruption_budget":[{"fixed":null,"percent":100}],"min_wait_duration":"60s"}]}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":["Mumbai","Hyderabad","Berlin","Frankfurt"]}],"resource_hierarchy_selector":[]}]}],"policy_orchestrator_id":"po-folder","state":"ACTIVE","terraform_labels":{"goog-terraform-provisioned":"true","state":"active"},"timeouts":null},"after_unknown":{"create_time":true,"effective_labels":{},"etag":true,"folder_id":true,"id":true,"labels":{},"name":true,"orchestrated_resource":[{"os_policy_assignment_v1_payload":[{"baseline":true,"deleted":true,"etag":true,"instance_filter":[{"exclusion_labels":[],"inclusion_labels":[],"inventories":[{}]}],"os_policies":[{"resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"pkg":[],"repository":[{"apt":[{"components":[false]}],"goo":[],"yum":[],"zypper":[]}]}]}]}],"reconciling":true,"revision_create_time":true,"revision_id":true,"rollout":[{"disruption_budget":[{}]}],"rollout_state":true,"uid":true}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":[false,false,false,false]}],"resource_hierarchy_selector":[]}]}],"orchestration_state":true,"reconciling":true,"terraform_labels":{},"update_time":true},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"labels":{},"orchestrated_resource":[{"os_policy_assignment_v1_payload":[{"instance_filter":[{"exclusion_labels":[],"inclusion_labels":[],"inventories":[{}]}],"os_policies":[{"resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"pkg":[],"repository":[{"apt":[{"components":[false]}],"goo":[],"yum":[],"zypper":[]}]}]}]}],"rollout":[{"disruption_budget":[{}]}]}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":[false,false,false,false]}],"resource_hierarchy_selector":[]}]}],"orchestration_state":[],"terraform_labels":{}}}},{"address":"time_sleep.wait_30_sec","mode":"managed","type":"time_sleep","name":"wait_30_sec","provider_name":"registry.terraform.io/hashicorp/time","change":{"actions":["create"],"before":null,"after":{"create_duration":"30s","destroy_duration":null,"triggers":null},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"time_sleep.wait_30_sec_nc","mode":"managed","type":"time_sleep","name":"wait_30_sec_nc","provider_name":"registry.terraform.io/hashicorp/time","change":{"actions":["create"],"before":null,"after":{"create_duration":"30s","destroy_duration":null,"triggers":null},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"time_sleep.wait_3_min","mode":"managed","type":"time_sleep","name":"wait_3_min","provider_name":"registry.terraform.io/hashicorp/time","change":{"actions":["create"],"before":null,"after":{"create_duration":"180s","destroy_duration":null,"triggers":null},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{}}},{"address":"time_sleep.wait_3_min_nc","mode":"managed","type":"time_sleep","name":"wait_3_min_nc","provider_name":"registry.terraform.io/hashicorp/time","change":{"actions":["create"],"before":null,"after":{"create_duration":"180s","destroy_duration":null,"triggers":null},"after_unknown":{"id":true},"before_sensitive":false,"after_sensitive":{}}}],"configuration":{"provider_config":{"google-beta":{"name":"google-beta","full_name":"registry.terraform.io/hashicorp/google-beta"},"time":{"name":"time","full_name":"registry.terraform.io/hashicorp/time"}},"root_module":{"resources":[{"address":"google_folder.my_folder","mode":"managed","type":"google_folder","name":"my_folder","provider_config_key":"google-beta","expressions":{"deletion_protection":{"constant_value":false},"display_name":{"constant_value":"po-folder"},"parent":{"constant_value":"organizations/123456789"}},"schema_version":0},{"address":"google_folder.my_folder_nc","mode":"managed","type":"google_folder","name":"my_folder_nc","provider_config_key":"google-beta","expressions":{"deletion_protection":{"constant_value":false},"display_name":{"constant_value":"po-folder"},"parent":{"constant_value":"organizations/123456789"}},"schema_version":0},{"address":"google_folder_iam_member.iam_osconfig_rollout_service_agent","mode":"managed","type":"google_folder_iam_member","name":"iam_osconfig_rollout_service_agent","provider_config_key":"google-beta","expressions":{"folder":{"references":["google_folder.my_folder.folder_id","google_folder.my_folder"]},"member":{"references":["google_folder.my_folder.folder_id","google_folder.my_folder"]},"role":{"constant_value":"roles/osconfig.rolloutServiceAgent"}},"schema_version":0,"depends_on":["google_folder_iam_member.iam_osconfig_service_agent"]},{"address":"google_folder_iam_member.iam_osconfig_rollout_service_agent_nc","mode":"managed","type":"google_folder_iam_member","name":"iam_osconfig_rollout_service_agent_nc","provider_config_key":"google-beta","expressions":{"folder":{"references":["google_folder.my_folder.folder_id","google_folder.my_folder"]},"member":{"references":["google_folder.my_folder.folder_id","google_folder.my_folder"]},"role":{"constant_value":"roles/osconfig.rolloutServiceAgent"}},"schema_version":0,"depends_on":["google_folder_iam_member.iam_osconfig_service_agent"]},{"address":"google_folder_iam_member.iam_osconfig_service_agent","mode":"managed","type":"google_folder_iam_member","name":"iam_osconfig_service_agent","provider_config_key":"google-beta","expressions":{"folder":{"references":["google_folder.my_folder.folder_id","google_folder.my_folder"]},"member":{"references":["google_folder_service_identity.osconfig_sa.member","google_folder_service_identity.osconfig_sa"]},"role":{"constant_value":"roles/osconfig.serviceAgent"}},"schema_version":0,"depends_on":["time_sleep.wait_30_sec"]},{"address":"google_folder_iam_member.iam_osconfig_service_agent_nc","mode":"managed","type":"google_folder_iam_member","name":"iam_osconfig_service_agent_nc","provider_config_key":"google-beta","expressions":{"folder":{"references":["google_folder.my_folder.folder_id","google_folder.my_folder"]},"member":{"references":["google_folder_service_identity.osconfig_sa.member","google_folder_service_identity.osconfig_sa"]},"role":{"constant_value":"roles/osconfig.serviceAgent"}},"schema_version":0,"depends_on":["time_sleep.wait_30_sec"]},{"address":"google_folder_iam_member.iam_progressiverollout_service_agent","mode":"managed","type":"google_folder_iam_member","name":"iam_progressiverollout_service_agent","provider_config_key":"google-beta","expressions":{"folder":{"references":["google_folder.my_folder.folder_id","google_folder.my_folder"]},"member":{"references":["google_folder_service_identity.ripple_sa.member","google_folder_service_identity.ripple_sa"]},"role":{"constant_value":"roles/progressiverollout.serviceAgent"}},"schema_version":0,"depends_on":["google_folder_iam_member.iam_osconfig_rollout_service_agent"]},{"address":"google_folder_iam_member.iam_progressiverollout_service_agent_nc","mode":"managed","type":"google_folder_iam_member","name":"iam_progressiverollout_service_agent_nc","provider_config_key":"google-beta","expressions":{"folder":{"references":["google_folder.my_folder.folder_id","google_folder.my_folder"]},"member":{"references":["google_folder_service_identity.ripple_sa.member","google_folder_service_identity.ripple_sa"]},"role":{"constant_value":"roles/progressiverollout.serviceAgent"}},"schema_version":0,"depends_on":["google_folder_iam_member.iam_osconfig_rollout_service_agent"]},{"address":"google_folder_service_identity.osconfig_sa","mode":"managed","type":"google_folder_service_identity","name":"osconfig_sa","provider_config_key":"google-beta","expressions":{"folder":{"references":["google_folder.my_folder.folder_id","google_folder.my_folder"]},"service":{"constant_value":"osconfig.googleapis.com"}},"schema_version":0},{"address":"google_folder_service_identity.osconfig_sa_nc","mode":"managed","type":"google_folder_service_identity","name":"osconfig_sa_nc","provider_config_key":"google-beta","expressions":{"folder":{"references":["google_folder.my_folder.folder_id","google_folder.my_folder"]},"service":{"constant_value":"osconfig.googleapis.com"}},"schema_version":0},{"address":"google_folder_service_identity.ripple_sa","mode":"managed","type":"google_folder_service_identity","name":"ripple_sa","provider_config_key":"google-beta","expressions":{"folder":{"references":["google_folder.my_folder.folder_id","google_folder.my_folder"]},"service":{"constant_value":"progressiverollout.googleapis.com"}},"schema_version":0},{"address":"google_folder_service_identity.ripple_sa_nc","mode":"managed","type":"google_folder_service_identity","name":"ripple_sa_nc","provider_config_key":"google-beta","expressions":{"folder":{"references":["google_folder.my_folder.folder_id","google_folder.my_folder"]},"service":{"constant_value":"progressiverollout.googleapis.com"}},"schema_version":0},{"address":"google_os_config_v2_policy_orchestrator_for_folder.c","mode":"managed","type":"google_os_config_v2_policy_orchestrator_for_folder","name":"c","provider_config_key":"google-beta","expressions":{"action":{"constant_value":"DELETE"},"folder_id":{"references":["google_folder.my_folder.folder_id","google_folder.my_folder"]},"labels":{"constant_value":{"environment":"test","state":"active"}},"orchestrated_resource":[{"id":{"constant_value":"test-orchestrated-resource-folder"},"os_policy_assignment_v1_payload":[{"instance_filter":[{"inventories":[{"os_short_name":{"constant_value":"Debian"}}]}],"os_policies":[{"id":{"constant_value":"test-os-policy-folder"},"mode":{"constant_value":"ENFORCEMENT"},"resource_groups":[{"resources":[{"id":{"constant_value":"Nmap"},"repository":[{"apt":[{"archive_type":{"constant_value":"DEB"},"components":{"constant_value":["main"]},"distribution":{"constant_value":"focal"},"uri":{"constant_value":"ppa:nmap/nmap"}}]}]}]}]}],"rollout":[{"disruption_budget":[{"percent":{"constant_value":100}}],"min_wait_duration":{"constant_value":"60s"}}]}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":{"constant_value":["Sydney","Melbourne"]}}]}]}],"policy_orchestrator_id":{"constant_value":"po-folder"},"state":{"constant_value":"STOPPED"}},"schema_version":0,"depends_on":["time_sleep.wait_3_min"]},{"address":"google_os_config_v2_policy_orchestrator_for_folder.nc","mode":"managed","type":"google_os_config_v2_policy_orchestrator_for_folder","name":"nc","provider_config_key":"google-beta","expressions":{"action":{"constant_value":"DELETE"},"folder_id":{"references":["google_folder.my_folder.folder_id","google_folder.my_folder"]},"labels":{"constant_value":{"state":"active"}},"orchestrated_resource":[{"id":{"constant_value":"test-orchestrated-resource"},"os_policy_assignment_v1_payload":[{"instance_filter":[{"inventories":[{"os_short_name":{"constant_value":"Windows"}}]}],"os_policies":[{"id":{"constant_value":"test-os-policy"},"mode":{"constant_value":"VALIDATION"},"resource_groups":[{"resources":[{"id":{"constant_value":"Nmap"},"repository":[{"apt":[{"archive_type":{"constant_value":"DEB_SRC"},"components":{"constant_value":["main"]},"distribution":{"constant_value":"focal"},"uri":{"constant_value":"ppa:nmap/nmap"}}]}]}]}]}],"rollout":[{"disruption_budget":[{"percent":{"constant_value":100}}],"min_wait_duration":{"constant_value":"60s"}}]}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":{"constant_value":["Mumbai","Hyderabad","Berlin","Frankfurt"]}}]}]}],"policy_orchestrator_id":{"constant_value":"po-folder"},"state":{"constant_value":"ACTIVE"}},"schema_version":0,"depends_on":["time_sleep.wait_3_min"]},{"address":"time_sleep.wait_30_sec","mode":"managed","type":"time_sleep","name":"wait_30_sec","provider_config_key":"time","expressions":{"create_duration":{"constant_value":"30s"}},"schema_version":0,"depends_on":["google_folder_service_identity.osconfig_sa","google_folder_service_identity.ripple_sa"]},{"address":"time_sleep.wait_30_sec_nc","mode":"managed","type":"time_sleep","name":"wait_30_sec_nc","provider_config_key":"time","expressions":{"create_duration":{"constant_value":"30s"}},"schema_version":0,"depends_on":["google_folder_service_identity.osconfig_sa","google_folder_service_identity.ripple_sa"]},{"address":"time_sleep.wait_3_min","mode":"managed","type":"time_sleep","name":"wait_3_min","provider_config_key":"time","expressions":{"create_duration":{"constant_value":"180s"}},"schema_version":0,"depends_on":["google_folder_iam_member.iam_progressiverollout_service_agent"]},{"address":"time_sleep.wait_3_min_nc","mode":"managed","type":"time_sleep","name":"wait_3_min_nc","provider_config_key":"time","expressions":{"create_duration":{"constant_value":"180s"}},"schema_version":0,"depends_on":["google_folder_iam_member.iam_progressiverollout_service_agent"]}]}},"relevant_attributes":[{"resource":"google_folder.my_folder","attribute":["folder_id"]},{"resource":"google_folder_service_identity.osconfig_sa","attribute":["member"]},{"resource":"google_folder_service_identity.ripple_sa","attribute":["member"]}],"timestamp":"2026-02-11T03:46:11Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/os_config_v2/policy_orchestrator_for_organization/action/.terraform.lock.hcl b/inputs/gcp/os_config_v2/policy_orchestrator_for_organization/action/.terraform.lock.hcl index 398f644f9..07ced9e69 100644 --- a/inputs/gcp/os_config_v2/policy_orchestrator_for_organization/action/.terraform.lock.hcl +++ b/inputs/gcp/os_config_v2/policy_orchestrator_for_organization/action/.terraform.lock.hcl @@ -4,6 +4,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "7.1.0" hashes = [ + "h1:1Asv8wk8g/aYL/eCbsWCSjaI16sFalhn+uoN1U8riyA=", "h1:QGAEyEO02IMwCKqbPCryzxvWkB8q8VRp8moGtwsN/w0=", "zh:271095580776620d5fa21dd60859a12d9c1d83a60e116069001e3206b78f01c3", "zh:303b7aa8c040a6d1c37792e3fb298e5311635ad0c81e3f8c31e6bb6d762c3cb0", diff --git a/inputs/gcp/os_config_v2/policy_orchestrator_for_organization/action/plan.json b/inputs/gcp/os_config_v2/policy_orchestrator_for_organization/action/plan.json new file mode 100644 index 000000000..110954c40 --- /dev/null +++ b/inputs/gcp/os_config_v2/policy_orchestrator_for_organization/action/plan.json @@ -0,0 +1 @@ +{"format_version":"1.2","terraform_version":"1.13.3","planned_values":{"root_module":{"resources":[{"address":"google_os_config_v2_policy_orchestrator_for_organization.c","mode":"managed","type":"google_os_config_v2_policy_orchestrator_for_organization","name":"c","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"action":"UPSERT","description":null,"effective_labels":{"goog-terraform-provisioned":"true","state":"active"},"labels":{"state":"active"},"orchestrated_resource":[{"id":"test-orchestrated-resource","os_policy_assignment_v1_payload":[{"description":null,"etag":null,"instance_filter":[{"all":null,"exclusion_labels":[],"inclusion_labels":[],"inventories":[{"os_short_name":"Debian","os_version":null}]}],"name":null,"os_policies":[{"allow_no_resource_group_match":null,"description":null,"id":"test-os-policy","mode":"VALIDATION","resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"id":"resource-tf","pkg":[],"repository":[]}]}]}],"rollout":[{"disruption_budget":[{"fixed":null,"percent":100}],"min_wait_duration":"60s"}]}]}],"orchestration_scope":[],"organization_id":"121623553414","policy_orchestrator_id":"po","state":"STOPPED","terraform_labels":{"goog-terraform-provisioned":"true","state":"active"},"timeouts":null},"sensitive_values":{"effective_labels":{},"labels":{},"orchestrated_resource":[{"os_policy_assignment_v1_payload":[{"instance_filter":[{"exclusion_labels":[],"inclusion_labels":[],"inventories":[{}]}],"os_policies":[{"resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"pkg":[],"repository":[]}]}]}],"rollout":[{"disruption_budget":[{}]}]}]}],"orchestration_scope":[],"orchestration_state":[],"terraform_labels":{}}},{"address":"google_os_config_v2_policy_orchestrator_for_organization.nc","mode":"managed","type":"google_os_config_v2_policy_orchestrator_for_organization","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"action":"DELETE","description":null,"effective_labels":{"goog-terraform-provisioned":"true","state":"active"},"labels":{"state":"active"},"orchestrated_resource":[{"id":"test-orchestrated-resource","os_policy_assignment_v1_payload":[{"description":null,"etag":null,"instance_filter":[{"all":null,"exclusion_labels":[],"inclusion_labels":[],"inventories":[{"os_short_name":"Debian","os_version":null}]}],"name":null,"os_policies":[{"allow_no_resource_group_match":null,"description":null,"id":"test-os-policy","mode":"VALIDATION","resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"id":"resource-tf","pkg":[],"repository":[]}]}]}],"rollout":[{"disruption_budget":[{"fixed":null,"percent":100}],"min_wait_duration":"60s"}]}]}],"orchestration_scope":[],"organization_id":"121623553414","policy_orchestrator_id":"p1","state":"ACTIVE","terraform_labels":{"goog-terraform-provisioned":"true","state":"active"},"timeouts":null},"sensitive_values":{"effective_labels":{},"labels":{},"orchestrated_resource":[{"os_policy_assignment_v1_payload":[{"instance_filter":[{"exclusion_labels":[],"inclusion_labels":[],"inventories":[{}]}],"os_policies":[{"resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"pkg":[],"repository":[]}]}]}],"rollout":[{"disruption_budget":[{}]}]}]}],"orchestration_scope":[],"orchestration_state":[],"terraform_labels":{}}}]}},"resource_changes":[{"address":"google_os_config_v2_policy_orchestrator_for_organization.c","mode":"managed","type":"google_os_config_v2_policy_orchestrator_for_organization","name":"c","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"action":"UPSERT","description":null,"effective_labels":{"goog-terraform-provisioned":"true","state":"active"},"labels":{"state":"active"},"orchestrated_resource":[{"id":"test-orchestrated-resource","os_policy_assignment_v1_payload":[{"description":null,"etag":null,"instance_filter":[{"all":null,"exclusion_labels":[],"inclusion_labels":[],"inventories":[{"os_short_name":"Debian","os_version":null}]}],"name":null,"os_policies":[{"allow_no_resource_group_match":null,"description":null,"id":"test-os-policy","mode":"VALIDATION","resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"id":"resource-tf","pkg":[],"repository":[]}]}]}],"rollout":[{"disruption_budget":[{"fixed":null,"percent":100}],"min_wait_duration":"60s"}]}]}],"orchestration_scope":[],"organization_id":"121623553414","policy_orchestrator_id":"po","state":"STOPPED","terraform_labels":{"goog-terraform-provisioned":"true","state":"active"},"timeouts":null},"after_unknown":{"create_time":true,"effective_labels":{},"etag":true,"id":true,"labels":{},"name":true,"orchestrated_resource":[{"os_policy_assignment_v1_payload":[{"baseline":true,"deleted":true,"instance_filter":[{"exclusion_labels":[],"inclusion_labels":[],"inventories":[{}]}],"os_policies":[{"resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"pkg":[],"repository":[]}]}]}],"reconciling":true,"revision_create_time":true,"revision_id":true,"rollout":[{"disruption_budget":[{}]}],"rollout_state":true,"uid":true}]}],"orchestration_scope":[],"orchestration_state":true,"reconciling":true,"terraform_labels":{},"update_time":true},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"labels":{},"orchestrated_resource":[{"os_policy_assignment_v1_payload":[{"instance_filter":[{"exclusion_labels":[],"inclusion_labels":[],"inventories":[{}]}],"os_policies":[{"resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"pkg":[],"repository":[]}]}]}],"rollout":[{"disruption_budget":[{}]}]}]}],"orchestration_scope":[],"orchestration_state":[],"terraform_labels":{}}}},{"address":"google_os_config_v2_policy_orchestrator_for_organization.nc","mode":"managed","type":"google_os_config_v2_policy_orchestrator_for_organization","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"action":"DELETE","description":null,"effective_labels":{"goog-terraform-provisioned":"true","state":"active"},"labels":{"state":"active"},"orchestrated_resource":[{"id":"test-orchestrated-resource","os_policy_assignment_v1_payload":[{"description":null,"etag":null,"instance_filter":[{"all":null,"exclusion_labels":[],"inclusion_labels":[],"inventories":[{"os_short_name":"Debian","os_version":null}]}],"name":null,"os_policies":[{"allow_no_resource_group_match":null,"description":null,"id":"test-os-policy","mode":"VALIDATION","resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"id":"resource-tf","pkg":[],"repository":[]}]}]}],"rollout":[{"disruption_budget":[{"fixed":null,"percent":100}],"min_wait_duration":"60s"}]}]}],"orchestration_scope":[],"organization_id":"121623553414","policy_orchestrator_id":"p1","state":"ACTIVE","terraform_labels":{"goog-terraform-provisioned":"true","state":"active"},"timeouts":null},"after_unknown":{"create_time":true,"effective_labels":{},"etag":true,"id":true,"labels":{},"name":true,"orchestrated_resource":[{"os_policy_assignment_v1_payload":[{"baseline":true,"deleted":true,"instance_filter":[{"exclusion_labels":[],"inclusion_labels":[],"inventories":[{}]}],"os_policies":[{"resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"pkg":[],"repository":[]}]}]}],"reconciling":true,"revision_create_time":true,"revision_id":true,"rollout":[{"disruption_budget":[{}]}],"rollout_state":true,"uid":true}]}],"orchestration_scope":[],"orchestration_state":true,"reconciling":true,"terraform_labels":{},"update_time":true},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"labels":{},"orchestrated_resource":[{"os_policy_assignment_v1_payload":[{"instance_filter":[{"exclusion_labels":[],"inclusion_labels":[],"inventories":[{}]}],"os_policies":[{"resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"pkg":[],"repository":[]}]}]}],"rollout":[{"disruption_budget":[{}]}]}]}],"orchestration_scope":[],"orchestration_state":[],"terraform_labels":{}}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_os_config_v2_policy_orchestrator_for_organization.c","mode":"managed","type":"google_os_config_v2_policy_orchestrator_for_organization","name":"c","provider_config_key":"google","expressions":{"action":{"constant_value":"UPSERT"},"labels":{"constant_value":{"state":"active"}},"orchestrated_resource":[{"id":{"constant_value":"test-orchestrated-resource"},"os_policy_assignment_v1_payload":[{"instance_filter":[{"inventories":[{"os_short_name":{"constant_value":"Debian"}}]}],"os_policies":[{"id":{"constant_value":"test-os-policy"},"mode":{"constant_value":"VALIDATION"},"resource_groups":[{"resources":[{"id":{"constant_value":"resource-tf"}}]}]}],"rollout":[{"disruption_budget":[{"percent":{"constant_value":100}}],"min_wait_duration":{"constant_value":"60s"}}]}]}],"organization_id":{"constant_value":"121623553414"},"policy_orchestrator_id":{"constant_value":"po"},"state":{"constant_value":"STOPPED"}},"schema_version":0},{"address":"google_os_config_v2_policy_orchestrator_for_organization.nc","mode":"managed","type":"google_os_config_v2_policy_orchestrator_for_organization","name":"nc","provider_config_key":"google","expressions":{"action":{"constant_value":"DELETE"},"labels":{"constant_value":{"state":"active"}},"orchestrated_resource":[{"id":{"constant_value":"test-orchestrated-resource"},"os_policy_assignment_v1_payload":[{"instance_filter":[{"inventories":[{"os_short_name":{"constant_value":"Debian"}}]}],"os_policies":[{"id":{"constant_value":"test-os-policy"},"mode":{"constant_value":"VALIDATION"},"resource_groups":[{"resources":[{"id":{"constant_value":"resource-tf"}}]}]}],"rollout":[{"disruption_budget":[{"percent":{"constant_value":100}}],"min_wait_duration":{"constant_value":"60s"}}]}]}],"organization_id":{"constant_value":"121623553414"},"policy_orchestrator_id":{"constant_value":"p1"},"state":{"constant_value":"ACTIVE"}},"schema_version":0}]}},"timestamp":"2026-02-11T03:46:10Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/os_config_v2/policy_orchestrator_for_organization/orchestrated_resource/.terraform.lock.hcl b/inputs/gcp/os_config_v2/policy_orchestrator_for_organization/orchestrated_resource/.terraform.lock.hcl index 398f644f9..07ced9e69 100644 --- a/inputs/gcp/os_config_v2/policy_orchestrator_for_organization/orchestrated_resource/.terraform.lock.hcl +++ b/inputs/gcp/os_config_v2/policy_orchestrator_for_organization/orchestrated_resource/.terraform.lock.hcl @@ -4,6 +4,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "7.1.0" hashes = [ + "h1:1Asv8wk8g/aYL/eCbsWCSjaI16sFalhn+uoN1U8riyA=", "h1:QGAEyEO02IMwCKqbPCryzxvWkB8q8VRp8moGtwsN/w0=", "zh:271095580776620d5fa21dd60859a12d9c1d83a60e116069001e3206b78f01c3", "zh:303b7aa8c040a6d1c37792e3fb298e5311635ad0c81e3f8c31e6bb6d762c3cb0", diff --git a/inputs/gcp/os_config_v2/policy_orchestrator_for_organization/orchestrated_resource/plan.json b/inputs/gcp/os_config_v2/policy_orchestrator_for_organization/orchestrated_resource/plan.json new file mode 100644 index 000000000..26fd55f5c --- /dev/null +++ b/inputs/gcp/os_config_v2/policy_orchestrator_for_organization/orchestrated_resource/plan.json @@ -0,0 +1 @@ +{"format_version":"1.2","terraform_version":"1.13.3","planned_values":{"root_module":{"resources":[{"address":"google_os_config_v2_policy_orchestrator_for_organization.c","mode":"managed","type":"google_os_config_v2_policy_orchestrator_for_organization","name":"c","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"action":"UPSERT","description":null,"effective_labels":{"goog-terraform-provisioned":"true","state":"active"},"labels":{"state":"active"},"orchestrated_resource":[{"id":"test-orchestrated-resource","os_policy_assignment_v1_payload":[{"description":null,"etag":null,"instance_filter":[{"all":null,"exclusion_labels":[],"inclusion_labels":[],"inventories":[{"os_short_name":"Debian","os_version":null}]}],"name":null,"os_policies":[{"allow_no_resource_group_match":null,"description":null,"id":"test-os-policy","mode":"VALIDATION","resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"id":"Nmap","pkg":[],"repository":[{"apt":[{"archive_type":"DEB","components":["main"],"distribution":"focal","gpg_key":null,"uri":"ppa:nmap/nmap"}],"goo":[],"yum":[],"zypper":[]}]}]}]}],"rollout":[{"disruption_budget":[{"fixed":null,"percent":100}],"min_wait_duration":"60s"}]}]}],"orchestration_scope":[],"organization_id":"121623553414","policy_orchestrator_id":"po","state":"ACTIVE","terraform_labels":{"goog-terraform-provisioned":"true","state":"active"},"timeouts":null},"sensitive_values":{"effective_labels":{},"labels":{},"orchestrated_resource":[{"os_policy_assignment_v1_payload":[{"instance_filter":[{"exclusion_labels":[],"inclusion_labels":[],"inventories":[{}]}],"os_policies":[{"resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"pkg":[],"repository":[{"apt":[{"components":[false]}],"goo":[],"yum":[],"zypper":[]}]}]}]}],"rollout":[{"disruption_budget":[{}]}]}]}],"orchestration_scope":[],"orchestration_state":[],"terraform_labels":{}}},{"address":"google_os_config_v2_policy_orchestrator_for_organization.nc","mode":"managed","type":"google_os_config_v2_policy_orchestrator_for_organization","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"action":"UPSERT","description":null,"effective_labels":{"goog-terraform-provisioned":"true","state":"active"},"labels":{"state":"active"},"orchestrated_resource":[{"id":"test-orchestrated-resource","os_policy_assignment_v1_payload":[{"description":null,"etag":null,"instance_filter":[{"all":null,"exclusion_labels":[],"inclusion_labels":[],"inventories":[{"os_short_name":"Windows","os_version":null}]}],"name":null,"os_policies":[{"allow_no_resource_group_match":null,"description":null,"id":"test-os-policy","mode":"MODE_UNSPECIFIED","resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"id":"Nmap","pkg":[],"repository":[{"apt":[{"archive_type":"UNSPECIFIED_ARCHIVE_TYPE","components":["main"],"distribution":"focal","gpg_key":null,"uri":"ppa:nmap/nmap"}],"goo":[],"yum":[],"zypper":[]}]}]}]}],"rollout":[{"disruption_budget":[{"fixed":null,"percent":100}],"min_wait_duration":"60s"}]}]}],"orchestration_scope":[],"organization_id":"121623553414","policy_orchestrator_id":"p1","state":"ACTIVE","terraform_labels":{"goog-terraform-provisioned":"true","state":"active"},"timeouts":null},"sensitive_values":{"effective_labels":{},"labels":{},"orchestrated_resource":[{"os_policy_assignment_v1_payload":[{"instance_filter":[{"exclusion_labels":[],"inclusion_labels":[],"inventories":[{}]}],"os_policies":[{"resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"pkg":[],"repository":[{"apt":[{"components":[false]}],"goo":[],"yum":[],"zypper":[]}]}]}]}],"rollout":[{"disruption_budget":[{}]}]}]}],"orchestration_scope":[],"orchestration_state":[],"terraform_labels":{}}}]}},"resource_changes":[{"address":"google_os_config_v2_policy_orchestrator_for_organization.c","mode":"managed","type":"google_os_config_v2_policy_orchestrator_for_organization","name":"c","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"action":"UPSERT","description":null,"effective_labels":{"goog-terraform-provisioned":"true","state":"active"},"labels":{"state":"active"},"orchestrated_resource":[{"id":"test-orchestrated-resource","os_policy_assignment_v1_payload":[{"description":null,"etag":null,"instance_filter":[{"all":null,"exclusion_labels":[],"inclusion_labels":[],"inventories":[{"os_short_name":"Debian","os_version":null}]}],"name":null,"os_policies":[{"allow_no_resource_group_match":null,"description":null,"id":"test-os-policy","mode":"VALIDATION","resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"id":"Nmap","pkg":[],"repository":[{"apt":[{"archive_type":"DEB","components":["main"],"distribution":"focal","gpg_key":null,"uri":"ppa:nmap/nmap"}],"goo":[],"yum":[],"zypper":[]}]}]}]}],"rollout":[{"disruption_budget":[{"fixed":null,"percent":100}],"min_wait_duration":"60s"}]}]}],"orchestration_scope":[],"organization_id":"121623553414","policy_orchestrator_id":"po","state":"ACTIVE","terraform_labels":{"goog-terraform-provisioned":"true","state":"active"},"timeouts":null},"after_unknown":{"create_time":true,"effective_labels":{},"etag":true,"id":true,"labels":{},"name":true,"orchestrated_resource":[{"os_policy_assignment_v1_payload":[{"baseline":true,"deleted":true,"instance_filter":[{"exclusion_labels":[],"inclusion_labels":[],"inventories":[{}]}],"os_policies":[{"resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"pkg":[],"repository":[{"apt":[{"components":[false]}],"goo":[],"yum":[],"zypper":[]}]}]}]}],"reconciling":true,"revision_create_time":true,"revision_id":true,"rollout":[{"disruption_budget":[{}]}],"rollout_state":true,"uid":true}]}],"orchestration_scope":[],"orchestration_state":true,"reconciling":true,"terraform_labels":{},"update_time":true},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"labels":{},"orchestrated_resource":[{"os_policy_assignment_v1_payload":[{"instance_filter":[{"exclusion_labels":[],"inclusion_labels":[],"inventories":[{}]}],"os_policies":[{"resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"pkg":[],"repository":[{"apt":[{"components":[false]}],"goo":[],"yum":[],"zypper":[]}]}]}]}],"rollout":[{"disruption_budget":[{}]}]}]}],"orchestration_scope":[],"orchestration_state":[],"terraform_labels":{}}}},{"address":"google_os_config_v2_policy_orchestrator_for_organization.nc","mode":"managed","type":"google_os_config_v2_policy_orchestrator_for_organization","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"action":"UPSERT","description":null,"effective_labels":{"goog-terraform-provisioned":"true","state":"active"},"labels":{"state":"active"},"orchestrated_resource":[{"id":"test-orchestrated-resource","os_policy_assignment_v1_payload":[{"description":null,"etag":null,"instance_filter":[{"all":null,"exclusion_labels":[],"inclusion_labels":[],"inventories":[{"os_short_name":"Windows","os_version":null}]}],"name":null,"os_policies":[{"allow_no_resource_group_match":null,"description":null,"id":"test-os-policy","mode":"MODE_UNSPECIFIED","resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"id":"Nmap","pkg":[],"repository":[{"apt":[{"archive_type":"UNSPECIFIED_ARCHIVE_TYPE","components":["main"],"distribution":"focal","gpg_key":null,"uri":"ppa:nmap/nmap"}],"goo":[],"yum":[],"zypper":[]}]}]}]}],"rollout":[{"disruption_budget":[{"fixed":null,"percent":100}],"min_wait_duration":"60s"}]}]}],"orchestration_scope":[],"organization_id":"121623553414","policy_orchestrator_id":"p1","state":"ACTIVE","terraform_labels":{"goog-terraform-provisioned":"true","state":"active"},"timeouts":null},"after_unknown":{"create_time":true,"effective_labels":{},"etag":true,"id":true,"labels":{},"name":true,"orchestrated_resource":[{"os_policy_assignment_v1_payload":[{"baseline":true,"deleted":true,"instance_filter":[{"exclusion_labels":[],"inclusion_labels":[],"inventories":[{}]}],"os_policies":[{"resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"pkg":[],"repository":[{"apt":[{"components":[false]}],"goo":[],"yum":[],"zypper":[]}]}]}]}],"reconciling":true,"revision_create_time":true,"revision_id":true,"rollout":[{"disruption_budget":[{}]}],"rollout_state":true,"uid":true}]}],"orchestration_scope":[],"orchestration_state":true,"reconciling":true,"terraform_labels":{},"update_time":true},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"labels":{},"orchestrated_resource":[{"os_policy_assignment_v1_payload":[{"instance_filter":[{"exclusion_labels":[],"inclusion_labels":[],"inventories":[{}]}],"os_policies":[{"resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[],"pkg":[],"repository":[{"apt":[{"components":[false]}],"goo":[],"yum":[],"zypper":[]}]}]}]}],"rollout":[{"disruption_budget":[{}]}]}]}],"orchestration_scope":[],"orchestration_state":[],"terraform_labels":{}}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_os_config_v2_policy_orchestrator_for_organization.c","mode":"managed","type":"google_os_config_v2_policy_orchestrator_for_organization","name":"c","provider_config_key":"google","expressions":{"action":{"constant_value":"UPSERT"},"labels":{"constant_value":{"state":"active"}},"orchestrated_resource":[{"id":{"constant_value":"test-orchestrated-resource"},"os_policy_assignment_v1_payload":[{"instance_filter":[{"inventories":[{"os_short_name":{"constant_value":"Debian"}}]}],"os_policies":[{"id":{"constant_value":"test-os-policy"},"mode":{"constant_value":"VALIDATION"},"resource_groups":[{"resources":[{"id":{"constant_value":"Nmap"},"repository":[{"apt":[{"archive_type":{"constant_value":"DEB"},"components":{"constant_value":["main"]},"distribution":{"constant_value":"focal"},"uri":{"constant_value":"ppa:nmap/nmap"}}]}]}]}]}],"rollout":[{"disruption_budget":[{"percent":{"constant_value":100}}],"min_wait_duration":{"constant_value":"60s"}}]}]}],"organization_id":{"constant_value":"121623553414"},"policy_orchestrator_id":{"constant_value":"po"},"state":{"constant_value":"ACTIVE"}},"schema_version":0},{"address":"google_os_config_v2_policy_orchestrator_for_organization.nc","mode":"managed","type":"google_os_config_v2_policy_orchestrator_for_organization","name":"nc","provider_config_key":"google","expressions":{"action":{"constant_value":"UPSERT"},"labels":{"constant_value":{"state":"active"}},"orchestrated_resource":[{"id":{"constant_value":"test-orchestrated-resource"},"os_policy_assignment_v1_payload":[{"instance_filter":[{"inventories":[{"os_short_name":{"constant_value":"Windows"}}]}],"os_policies":[{"id":{"constant_value":"test-os-policy"},"mode":{"constant_value":"MODE_UNSPECIFIED"},"resource_groups":[{"resources":[{"id":{"constant_value":"Nmap"},"repository":[{"apt":[{"archive_type":{"constant_value":"UNSPECIFIED_ARCHIVE_TYPE"},"components":{"constant_value":["main"]},"distribution":{"constant_value":"focal"},"uri":{"constant_value":"ppa:nmap/nmap"}}]}]}]}]}],"rollout":[{"disruption_budget":[{"percent":{"constant_value":100}}],"min_wait_duration":{"constant_value":"60s"}}]}]}],"organization_id":{"constant_value":"121623553414"},"policy_orchestrator_id":{"constant_value":"p1"},"state":{"constant_value":"ACTIVE"}},"schema_version":0}]}},"timestamp":"2026-02-11T03:46:11Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/os_config_v2/policy_orchestrator_for_organization/organization_id/.terraform.lock.hcl b/inputs/gcp/os_config_v2/policy_orchestrator_for_organization/organization_id/.terraform.lock.hcl index 380e52ba2..2d35c134a 100644 --- a/inputs/gcp/os_config_v2/policy_orchestrator_for_organization/organization_id/.terraform.lock.hcl +++ b/inputs/gcp/os_config_v2/policy_orchestrator_for_organization/organization_id/.terraform.lock.hcl @@ -2,20 +2,20 @@ # Manual edits may be lost in future updates. provider "registry.terraform.io/hashicorp/google" { - version = "7.1.1" + version = "7.19.0" hashes = [ - "h1:UsAkCIy4HSovXP+K0UdlX9LuqsT+xkSgQUKFn2jC4wQ=", - "zh:03ee9fdc0d157a606aba68658de6dc809fc3335cccb7c537373d8643412c1327", - "zh:110e8ffe81deb8c203ecf310a15c2dedca1dfc936473a247b8a4f98adebd86f5", - "zh:459e3419c004e7a475fb60cc52d47a34b3dc4e4de905eaa8e8f78ddbe550a9b5", - "zh:466cd31cee36877bc18aeabed80d1f4a22bac4e59a460be6e8bdb72dedca0e2b", - "zh:51d707eb2d854fa16dcbe21e29b01534eb893a2152a219ea84a15bbd87a4ff64", - "zh:69d6a1c83ffddd7f81273a98fb0ff7c13985a3c876565dd3df76c730c9929871", - "zh:9b5050da221735c7e8f75ed00d25578afaf8ed94a8c2f1f58f471eee98105d10", - "zh:ab01f2fd961ee86d99a55186093620d29f5323c0cd5613284d484e333679d70b", - "zh:d0f5b15774b15991baf71eb4a55a6831e3fb4b603f589f80b03393b46a9657a4", - "zh:dc198ec4b42435321f4fa12ca8d713cd350ff2f82d8749b87785b91b15b7c3ed", - "zh:e949c00ce89c92b7ed16cc0b0aed8e80d6416b240dc02047f9fa1de49aa4c44e", + "h1:8lfoMp5YTC0pDT5da1fOJNnEaCm8JWClTo51g9ceipE=", + "zh:06da157d858384b2383414447c1bf6cf319ad72ea87d7030c6ca18b9bb774f73", + "zh:2f1d7c3461a6b59ffcf0eed2f3764e2f0a2c70464927e561d968d82112e3600d", + "zh:4705ce487e6b2c52376e1f9bc0dc650e8326ab3e20d0673c9fed62e1313d2d67", + "zh:5cd9a4ee36d3d7ffbabb90c83cb7cce54cf0f10c912db4be7492ebc1a78611b3", + "zh:688622dbac98fe95115518ff3d9324cf71ffdf124ca6e66b2269f43d9f8e7ceb", + "zh:7a5c07ae0728c7a57a63d848411c91550fd3bfe662f60821b50d3370be360134", + "zh:8a6472dec8082d7225a811c8ee0bf550c7a9c36e86cfd19b10363106f2dfbb80", + "zh:8e11d4c27e70500aaa1335cb721ad64c4b0e41b3c7398d6fe58a3d92f10ea213", + "zh:9a119c27e27bad73cdd8c0544f8a68a84bdac3de0129f13a87a6890ed19c6035", + "zh:dd12460d2b8b4497b5a7c46bb486ace9859d2fc642782989df315e618596d1e4", "zh:f569b65999264a9416862bca5cd2a6177d94ccb0424f3a4ef424428912b9cb3c", + "zh:fc35c660777b377978e5f2d008db6181ff2f98777cdd215effc11d665e99e0bc", ] } diff --git a/inputs/gcp/os_config_v2/policy_orchestrator_for_organization/organization_id/plan.json b/inputs/gcp/os_config_v2/policy_orchestrator_for_organization/organization_id/plan.json new file mode 100644 index 000000000..1d5319d45 --- /dev/null +++ b/inputs/gcp/os_config_v2/policy_orchestrator_for_organization/organization_id/plan.json @@ -0,0 +1 @@ +{"format_version":"1.2","terraform_version":"1.13.3","planned_values":{"root_module":{"resources":[{"address":"google_os_config_v2_policy_orchestrator_for_organization.c","mode":"managed","type":"google_os_config_v2_policy_orchestrator_for_organization","name":"c","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"action":"UPSERT","description":null,"effective_labels":{"goog-terraform-provisioned":"true","state":"active"},"labels":{"state":"active"},"orchestrated_resource":[{"id":"test-orchestrated-resource-org","os_policy_assignment_v1_payload":[{"description":null,"etag":null,"instance_filter":[{"all":null,"exclusion_labels":[],"inclusion_labels":[],"inventories":[{"os_short_name":"windows-10","os_version":null}]}],"name":null,"os_policies":[{"allow_no_resource_group_match":null,"description":null,"id":"test-os-policy-org","mode":"VALIDATION","resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[{"content":"file-content-tf","file":[],"path":"file-path-tf-1","permissions":null,"state":"PRESENT"}],"id":"resource-tf","pkg":[],"repository":[]}]}]}],"rollout":[{"disruption_budget":[{"fixed":null,"percent":100}],"min_wait_duration":"60s"}]}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":[""]}],"resource_hierarchy_selector":[]}]}],"organization_id":"Hardhat-PDE-gcp-a1","policy_orchestrator_id":"google-gcp-production-a1","state":"ACTIVE","terraform_labels":{"goog-terraform-provisioned":"true","state":"active"},"timeouts":null},"sensitive_values":{"effective_labels":{},"labels":{},"orchestrated_resource":[{"os_policy_assignment_v1_payload":[{"instance_filter":[{"exclusion_labels":[],"inclusion_labels":[],"inventories":[{}]}],"os_policies":[{"resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[{"file":[]}],"pkg":[],"repository":[]}]}]}],"rollout":[{"disruption_budget":[{}]}]}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":[false]}],"resource_hierarchy_selector":[]}]}],"orchestration_state":[],"terraform_labels":{}}},{"address":"google_os_config_v2_policy_orchestrator_for_organization.nc","mode":"managed","type":"google_os_config_v2_policy_orchestrator_for_organization","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"action":"UPSERT","description":null,"effective_labels":{"goog-terraform-provisioned":"true","state":"active"},"labels":{"state":"active"},"orchestrated_resource":[{"id":"test-orchestrated-resource-org","os_policy_assignment_v1_payload":[{"description":null,"etag":null,"instance_filter":[{"all":null,"exclusion_labels":[],"inclusion_labels":[],"inventories":[{"os_short_name":"windows-10","os_version":null}]}],"name":null,"os_policies":[{"allow_no_resource_group_match":null,"description":null,"id":"test-os-policy-org","mode":"VALIDATION","resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[{"content":"file-content-tf","file":[],"path":"file-path-tf-1","permissions":null,"state":"PRESENT"}],"id":"resource-tf","pkg":[],"repository":[]}]}]}],"rollout":[{"disruption_budget":[{"fixed":null,"percent":100}],"min_wait_duration":"60s"}]}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":[""]}],"resource_hierarchy_selector":[]}]}],"organization_id":"Hardhat-PDE-alibaba-a1","policy_orchestrator_id":"google-gcp-production-a1","state":"ACTIVE","terraform_labels":{"goog-terraform-provisioned":"true","state":"active"},"timeouts":null},"sensitive_values":{"effective_labels":{},"labels":{},"orchestrated_resource":[{"os_policy_assignment_v1_payload":[{"instance_filter":[{"exclusion_labels":[],"inclusion_labels":[],"inventories":[{}]}],"os_policies":[{"resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[{"file":[]}],"pkg":[],"repository":[]}]}]}],"rollout":[{"disruption_budget":[{}]}]}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":[false]}],"resource_hierarchy_selector":[]}]}],"orchestration_state":[],"terraform_labels":{}}}]}},"resource_changes":[{"address":"google_os_config_v2_policy_orchestrator_for_organization.c","mode":"managed","type":"google_os_config_v2_policy_orchestrator_for_organization","name":"c","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"action":"UPSERT","description":null,"effective_labels":{"goog-terraform-provisioned":"true","state":"active"},"labels":{"state":"active"},"orchestrated_resource":[{"id":"test-orchestrated-resource-org","os_policy_assignment_v1_payload":[{"description":null,"etag":null,"instance_filter":[{"all":null,"exclusion_labels":[],"inclusion_labels":[],"inventories":[{"os_short_name":"windows-10","os_version":null}]}],"name":null,"os_policies":[{"allow_no_resource_group_match":null,"description":null,"id":"test-os-policy-org","mode":"VALIDATION","resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[{"content":"file-content-tf","file":[],"path":"file-path-tf-1","permissions":null,"state":"PRESENT"}],"id":"resource-tf","pkg":[],"repository":[]}]}]}],"rollout":[{"disruption_budget":[{"fixed":null,"percent":100}],"min_wait_duration":"60s"}]}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":[""]}],"resource_hierarchy_selector":[]}]}],"organization_id":"Hardhat-PDE-gcp-a1","policy_orchestrator_id":"google-gcp-production-a1","state":"ACTIVE","terraform_labels":{"goog-terraform-provisioned":"true","state":"active"},"timeouts":null},"after_unknown":{"create_time":true,"effective_labels":{},"etag":true,"id":true,"labels":{},"name":true,"orchestrated_resource":[{"os_policy_assignment_v1_payload":[{"baseline":true,"deleted":true,"instance_filter":[{"exclusion_labels":[],"inclusion_labels":[],"inventories":[{}]}],"os_policies":[{"resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[{"file":[]}],"pkg":[],"repository":[]}]}]}],"reconciling":true,"revision_create_time":true,"revision_id":true,"rollout":[{"disruption_budget":[{}]}],"rollout_state":true,"uid":true}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":[false]}],"resource_hierarchy_selector":[]}]}],"orchestration_state":true,"reconciling":true,"terraform_labels":{},"update_time":true},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"labels":{},"orchestrated_resource":[{"os_policy_assignment_v1_payload":[{"instance_filter":[{"exclusion_labels":[],"inclusion_labels":[],"inventories":[{}]}],"os_policies":[{"resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[{"file":[]}],"pkg":[],"repository":[]}]}]}],"rollout":[{"disruption_budget":[{}]}]}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":[false]}],"resource_hierarchy_selector":[]}]}],"orchestration_state":[],"terraform_labels":{}}}},{"address":"google_os_config_v2_policy_orchestrator_for_organization.nc","mode":"managed","type":"google_os_config_v2_policy_orchestrator_for_organization","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"action":"UPSERT","description":null,"effective_labels":{"goog-terraform-provisioned":"true","state":"active"},"labels":{"state":"active"},"orchestrated_resource":[{"id":"test-orchestrated-resource-org","os_policy_assignment_v1_payload":[{"description":null,"etag":null,"instance_filter":[{"all":null,"exclusion_labels":[],"inclusion_labels":[],"inventories":[{"os_short_name":"windows-10","os_version":null}]}],"name":null,"os_policies":[{"allow_no_resource_group_match":null,"description":null,"id":"test-os-policy-org","mode":"VALIDATION","resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[{"content":"file-content-tf","file":[],"path":"file-path-tf-1","permissions":null,"state":"PRESENT"}],"id":"resource-tf","pkg":[],"repository":[]}]}]}],"rollout":[{"disruption_budget":[{"fixed":null,"percent":100}],"min_wait_duration":"60s"}]}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":[""]}],"resource_hierarchy_selector":[]}]}],"organization_id":"Hardhat-PDE-alibaba-a1","policy_orchestrator_id":"google-gcp-production-a1","state":"ACTIVE","terraform_labels":{"goog-terraform-provisioned":"true","state":"active"},"timeouts":null},"after_unknown":{"create_time":true,"effective_labels":{},"etag":true,"id":true,"labels":{},"name":true,"orchestrated_resource":[{"os_policy_assignment_v1_payload":[{"baseline":true,"deleted":true,"instance_filter":[{"exclusion_labels":[],"inclusion_labels":[],"inventories":[{}]}],"os_policies":[{"resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[{"file":[]}],"pkg":[],"repository":[]}]}]}],"reconciling":true,"revision_create_time":true,"revision_id":true,"rollout":[{"disruption_budget":[{}]}],"rollout_state":true,"uid":true}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":[false]}],"resource_hierarchy_selector":[]}]}],"orchestration_state":true,"reconciling":true,"terraform_labels":{},"update_time":true},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"labels":{},"orchestrated_resource":[{"os_policy_assignment_v1_payload":[{"instance_filter":[{"exclusion_labels":[],"inclusion_labels":[],"inventories":[{}]}],"os_policies":[{"resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[{"file":[]}],"pkg":[],"repository":[]}]}]}],"rollout":[{"disruption_budget":[{}]}]}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":[false]}],"resource_hierarchy_selector":[]}]}],"orchestration_state":[],"terraform_labels":{}}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_os_config_v2_policy_orchestrator_for_organization.c","mode":"managed","type":"google_os_config_v2_policy_orchestrator_for_organization","name":"c","provider_config_key":"google","expressions":{"action":{"constant_value":"UPSERT"},"labels":{"constant_value":{"state":"active"}},"orchestrated_resource":[{"id":{"constant_value":"test-orchestrated-resource-org"},"os_policy_assignment_v1_payload":[{"instance_filter":[{"inventories":[{"os_short_name":{"constant_value":"windows-10"}}]}],"os_policies":[{"id":{"constant_value":"test-os-policy-org"},"mode":{"constant_value":"VALIDATION"},"resource_groups":[{"resources":[{"file":[{"content":{"constant_value":"file-content-tf"},"path":{"constant_value":"file-path-tf-1"},"state":{"constant_value":"PRESENT"}}],"id":{"constant_value":"resource-tf"}}]}]}],"rollout":[{"disruption_budget":[{"percent":{"constant_value":100}}],"min_wait_duration":{"constant_value":"60s"}}]}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":{"constant_value":[""]}}]}]}],"organization_id":{"constant_value":"Hardhat-PDE-gcp-a1"},"policy_orchestrator_id":{"constant_value":"google-gcp-production-a1"},"state":{"constant_value":"ACTIVE"}},"schema_version":0},{"address":"google_os_config_v2_policy_orchestrator_for_organization.nc","mode":"managed","type":"google_os_config_v2_policy_orchestrator_for_organization","name":"nc","provider_config_key":"google","expressions":{"action":{"constant_value":"UPSERT"},"labels":{"constant_value":{"state":"active"}},"orchestrated_resource":[{"id":{"constant_value":"test-orchestrated-resource-org"},"os_policy_assignment_v1_payload":[{"instance_filter":[{"inventories":[{"os_short_name":{"constant_value":"windows-10"}}]}],"os_policies":[{"id":{"constant_value":"test-os-policy-org"},"mode":{"constant_value":"VALIDATION"},"resource_groups":[{"resources":[{"file":[{"content":{"constant_value":"file-content-tf"},"path":{"constant_value":"file-path-tf-1"},"state":{"constant_value":"PRESENT"}}],"id":{"constant_value":"resource-tf"}}]}]}],"rollout":[{"disruption_budget":[{"percent":{"constant_value":100}}],"min_wait_duration":{"constant_value":"60s"}}]}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":{"constant_value":[""]}}]}]}],"organization_id":{"constant_value":"Hardhat-PDE-alibaba-a1"},"policy_orchestrator_id":{"constant_value":"google-gcp-production-a1"},"state":{"constant_value":"ACTIVE"}},"schema_version":0}]}},"timestamp":"2026-02-11T03:46:22Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/os_config_v2/policy_orchestrator_for_organization/policy_orchestrator_id/plan.json b/inputs/gcp/os_config_v2/policy_orchestrator_for_organization/policy_orchestrator_id/plan.json new file mode 100644 index 000000000..b664e623d --- /dev/null +++ b/inputs/gcp/os_config_v2/policy_orchestrator_for_organization/policy_orchestrator_id/plan.json @@ -0,0 +1 @@ +{"format_version":"1.2","terraform_version":"1.13.3","planned_values":{"root_module":{"resources":[{"address":"google_os_config_v2_policy_orchestrator_for_organization.c","mode":"managed","type":"google_os_config_v2_policy_orchestrator_for_organization","name":"c","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"action":"UPSERT","description":null,"effective_labels":{"goog-terraform-provisioned":"true","state":"active"},"labels":{"state":"active"},"orchestrated_resource":[{"id":"test-orchestrated-resource-org","os_policy_assignment_v1_payload":[{"description":null,"etag":null,"instance_filter":[{"all":null,"exclusion_labels":[],"inclusion_labels":[],"inventories":[{"os_short_name":"windows-10","os_version":null}]}],"name":null,"os_policies":[{"allow_no_resource_group_match":null,"description":null,"id":"test-os-policy-org","mode":"VALIDATION","resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[{"content":"file-content-tf","file":[],"path":"file-path-tf-1","permissions":null,"state":"PRESENT"}],"id":"resource-tf","pkg":[],"repository":[]}]}]}],"rollout":[{"disruption_budget":[{"fixed":null,"percent":100}],"min_wait_duration":"60s"}]}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":[""]}],"resource_hierarchy_selector":[]}]}],"organization_id":"123456789","policy_orchestrator_id":"google-gcp-production-a1","state":"ACTIVE","terraform_labels":{"goog-terraform-provisioned":"true","state":"active"},"timeouts":null},"sensitive_values":{"effective_labels":{},"labels":{},"orchestrated_resource":[{"os_policy_assignment_v1_payload":[{"instance_filter":[{"exclusion_labels":[],"inclusion_labels":[],"inventories":[{}]}],"os_policies":[{"resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[{"file":[]}],"pkg":[],"repository":[]}]}]}],"rollout":[{"disruption_budget":[{}]}]}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":[false]}],"resource_hierarchy_selector":[]}]}],"orchestration_state":[],"terraform_labels":{}}},{"address":"google_os_config_v2_policy_orchestrator_for_organization.nc","mode":"managed","type":"google_os_config_v2_policy_orchestrator_for_organization","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"action":"UPSERT","description":null,"effective_labels":{"goog-terraform-provisioned":"true","state":"active"},"labels":{"state":"active"},"orchestrated_resource":[{"id":"test-orchestrated-resource-org","os_policy_assignment_v1_payload":[{"description":null,"etag":null,"instance_filter":[{"all":null,"exclusion_labels":[],"inclusion_labels":[],"inventories":[{"os_short_name":"windows-10","os_version":null}]}],"name":null,"os_policies":[{"allow_no_resource_group_match":null,"description":null,"id":"test-os-policy-org","mode":"VALIDATION","resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[{"content":"file-content-tf","file":[],"path":"file-path-tf-1","permissions":null,"state":"PRESENT"}],"id":"resource-tf","pkg":[],"repository":[]}]}]}],"rollout":[{"disruption_budget":[{"fixed":null,"percent":100}],"min_wait_duration":"60s"}]}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":[""]}],"resource_hierarchy_selector":[]}]}],"organization_id":"123456789","policy_orchestrator_id":"bankofamerica-gcp-production-a1","state":"ACTIVE","terraform_labels":{"goog-terraform-provisioned":"true","state":"active"},"timeouts":null},"sensitive_values":{"effective_labels":{},"labels":{},"orchestrated_resource":[{"os_policy_assignment_v1_payload":[{"instance_filter":[{"exclusion_labels":[],"inclusion_labels":[],"inventories":[{}]}],"os_policies":[{"resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[{"file":[]}],"pkg":[],"repository":[]}]}]}],"rollout":[{"disruption_budget":[{}]}]}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":[false]}],"resource_hierarchy_selector":[]}]}],"orchestration_state":[],"terraform_labels":{}}}]}},"resource_changes":[{"address":"google_os_config_v2_policy_orchestrator_for_organization.c","mode":"managed","type":"google_os_config_v2_policy_orchestrator_for_organization","name":"c","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"action":"UPSERT","description":null,"effective_labels":{"goog-terraform-provisioned":"true","state":"active"},"labels":{"state":"active"},"orchestrated_resource":[{"id":"test-orchestrated-resource-org","os_policy_assignment_v1_payload":[{"description":null,"etag":null,"instance_filter":[{"all":null,"exclusion_labels":[],"inclusion_labels":[],"inventories":[{"os_short_name":"windows-10","os_version":null}]}],"name":null,"os_policies":[{"allow_no_resource_group_match":null,"description":null,"id":"test-os-policy-org","mode":"VALIDATION","resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[{"content":"file-content-tf","file":[],"path":"file-path-tf-1","permissions":null,"state":"PRESENT"}],"id":"resource-tf","pkg":[],"repository":[]}]}]}],"rollout":[{"disruption_budget":[{"fixed":null,"percent":100}],"min_wait_duration":"60s"}]}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":[""]}],"resource_hierarchy_selector":[]}]}],"organization_id":"123456789","policy_orchestrator_id":"google-gcp-production-a1","state":"ACTIVE","terraform_labels":{"goog-terraform-provisioned":"true","state":"active"},"timeouts":null},"after_unknown":{"create_time":true,"effective_labels":{},"etag":true,"id":true,"labels":{},"name":true,"orchestrated_resource":[{"os_policy_assignment_v1_payload":[{"baseline":true,"deleted":true,"instance_filter":[{"exclusion_labels":[],"inclusion_labels":[],"inventories":[{}]}],"os_policies":[{"resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[{"file":[]}],"pkg":[],"repository":[]}]}]}],"reconciling":true,"revision_create_time":true,"revision_id":true,"rollout":[{"disruption_budget":[{}]}],"rollout_state":true,"uid":true}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":[false]}],"resource_hierarchy_selector":[]}]}],"orchestration_state":true,"reconciling":true,"terraform_labels":{},"update_time":true},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"labels":{},"orchestrated_resource":[{"os_policy_assignment_v1_payload":[{"instance_filter":[{"exclusion_labels":[],"inclusion_labels":[],"inventories":[{}]}],"os_policies":[{"resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[{"file":[]}],"pkg":[],"repository":[]}]}]}],"rollout":[{"disruption_budget":[{}]}]}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":[false]}],"resource_hierarchy_selector":[]}]}],"orchestration_state":[],"terraform_labels":{}}}},{"address":"google_os_config_v2_policy_orchestrator_for_organization.nc","mode":"managed","type":"google_os_config_v2_policy_orchestrator_for_organization","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"action":"UPSERT","description":null,"effective_labels":{"goog-terraform-provisioned":"true","state":"active"},"labels":{"state":"active"},"orchestrated_resource":[{"id":"test-orchestrated-resource-org","os_policy_assignment_v1_payload":[{"description":null,"etag":null,"instance_filter":[{"all":null,"exclusion_labels":[],"inclusion_labels":[],"inventories":[{"os_short_name":"windows-10","os_version":null}]}],"name":null,"os_policies":[{"allow_no_resource_group_match":null,"description":null,"id":"test-os-policy-org","mode":"VALIDATION","resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[{"content":"file-content-tf","file":[],"path":"file-path-tf-1","permissions":null,"state":"PRESENT"}],"id":"resource-tf","pkg":[],"repository":[]}]}]}],"rollout":[{"disruption_budget":[{"fixed":null,"percent":100}],"min_wait_duration":"60s"}]}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":[""]}],"resource_hierarchy_selector":[]}]}],"organization_id":"123456789","policy_orchestrator_id":"bankofamerica-gcp-production-a1","state":"ACTIVE","terraform_labels":{"goog-terraform-provisioned":"true","state":"active"},"timeouts":null},"after_unknown":{"create_time":true,"effective_labels":{},"etag":true,"id":true,"labels":{},"name":true,"orchestrated_resource":[{"os_policy_assignment_v1_payload":[{"baseline":true,"deleted":true,"instance_filter":[{"exclusion_labels":[],"inclusion_labels":[],"inventories":[{}]}],"os_policies":[{"resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[{"file":[]}],"pkg":[],"repository":[]}]}]}],"reconciling":true,"revision_create_time":true,"revision_id":true,"rollout":[{"disruption_budget":[{}]}],"rollout_state":true,"uid":true}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":[false]}],"resource_hierarchy_selector":[]}]}],"orchestration_state":true,"reconciling":true,"terraform_labels":{},"update_time":true},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"labels":{},"orchestrated_resource":[{"os_policy_assignment_v1_payload":[{"instance_filter":[{"exclusion_labels":[],"inclusion_labels":[],"inventories":[{}]}],"os_policies":[{"resource_groups":[{"inventory_filters":[],"resources":[{"exec":[],"file":[{"file":[]}],"pkg":[],"repository":[]}]}]}],"rollout":[{"disruption_budget":[{}]}]}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":[false]}],"resource_hierarchy_selector":[]}]}],"orchestration_state":[],"terraform_labels":{}}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_os_config_v2_policy_orchestrator_for_organization.c","mode":"managed","type":"google_os_config_v2_policy_orchestrator_for_organization","name":"c","provider_config_key":"google","expressions":{"action":{"constant_value":"UPSERT"},"labels":{"constant_value":{"state":"active"}},"orchestrated_resource":[{"id":{"constant_value":"test-orchestrated-resource-org"},"os_policy_assignment_v1_payload":[{"instance_filter":[{"inventories":[{"os_short_name":{"constant_value":"windows-10"}}]}],"os_policies":[{"id":{"constant_value":"test-os-policy-org"},"mode":{"constant_value":"VALIDATION"},"resource_groups":[{"resources":[{"file":[{"content":{"constant_value":"file-content-tf"},"path":{"constant_value":"file-path-tf-1"},"state":{"constant_value":"PRESENT"}}],"id":{"constant_value":"resource-tf"}}]}]}],"rollout":[{"disruption_budget":[{"percent":{"constant_value":100}}],"min_wait_duration":{"constant_value":"60s"}}]}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":{"constant_value":[""]}}]}]}],"organization_id":{"constant_value":"123456789"},"policy_orchestrator_id":{"constant_value":"google-gcp-production-a1"},"state":{"constant_value":"ACTIVE"}},"schema_version":0},{"address":"google_os_config_v2_policy_orchestrator_for_organization.nc","mode":"managed","type":"google_os_config_v2_policy_orchestrator_for_organization","name":"nc","provider_config_key":"google","expressions":{"action":{"constant_value":"UPSERT"},"labels":{"constant_value":{"state":"active"}},"orchestrated_resource":[{"id":{"constant_value":"test-orchestrated-resource-org"},"os_policy_assignment_v1_payload":[{"instance_filter":[{"inventories":[{"os_short_name":{"constant_value":"windows-10"}}]}],"os_policies":[{"id":{"constant_value":"test-os-policy-org"},"mode":{"constant_value":"VALIDATION"},"resource_groups":[{"resources":[{"file":[{"content":{"constant_value":"file-content-tf"},"path":{"constant_value":"file-path-tf-1"},"state":{"constant_value":"PRESENT"}}],"id":{"constant_value":"resource-tf"}}]}]}],"rollout":[{"disruption_budget":[{"percent":{"constant_value":100}}],"min_wait_duration":{"constant_value":"60s"}}]}]}],"orchestration_scope":[{"selectors":[{"location_selector":[{"included_locations":{"constant_value":[""]}}]}]}],"organization_id":{"constant_value":"123456789"},"policy_orchestrator_id":{"constant_value":"bankofamerica-gcp-production-a1"},"state":{"constant_value":"ACTIVE"}},"schema_version":0}]}},"timestamp":"2026-02-11T03:46:15Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/oslogin/google_compute_instance/require_shielded_vm/.terraform.lock.hcl b/inputs/gcp/oslogin/google_compute_instance/require_shielded_vm/.terraform.lock.hcl new file mode 100644 index 000000000..fb70c16e3 --- /dev/null +++ b/inputs/gcp/oslogin/google_compute_instance/require_shielded_vm/.terraform.lock.hcl @@ -0,0 +1,21 @@ +# This file is maintained automatically by "terraform init". +# Manual edits may be lost in future updates. + +provider "registry.terraform.io/hashicorp/google" { + version = "7.14.1" + hashes = [ + "h1:T3ZZsRvZxmFd9e945+QPH6Fpz2y3AM0qewPaceNyjEA=", + "zh:0006182db112098af8514fc38d9cd4e816da4145a2a0b9fb62cc9e281eb2b2a1", + "zh:60311d9770ca26c549af9a964ee6cb60ce7541b52fedfaf5f112b0931e6bcce1", + "zh:65b400c0718f6b7c5cd0fba1b2e3696d5f4f69868229627b11b0b2b94b613ade", + "zh:9ec00812dc750687610140f9a97c374492ef320eddcb669b154e1d2e8714f7f3", + "zh:adaf0486d68da121886992a3762cedffa86b611fa43294359b2a569044c462a7", + "zh:ba95c0d8279dd8e7b9294e521e461d4adaa7c171b00502be197b6c7ff4f07d65", + "zh:c216ca4b350a90c4e74e3f502ef3f35617cdd5c278e2b04ecba2bca980fb5e96", + "zh:dd7991a71477dee46c7c57f60775341524271c425ab04e66d8f2762f9b4763eb", + "zh:dd7b63b40e67b073d2acb32ee60099d884ce75bf1152a307422c47358054d170", + "zh:e5d601ca4ab813c51d897e4c2e80bf3e3565c0dd4f37f85bb91964e90ca92dfe", + "zh:f12d8f91ed783ffac9ed8d6c331e0cbe5189455fe352ba633b171b366f52e2cd", + "zh:f569b65999264a9416862bca5cd2a6177d94ccb0424f3a4ef424428912b9cb3c", + ] +} diff --git a/inputs/gcp/oslogin/google_compute_instance/restrict_external_ip/.terraform.lock.hcl b/inputs/gcp/oslogin/google_compute_instance/restrict_external_ip/.terraform.lock.hcl new file mode 100644 index 000000000..fb70c16e3 --- /dev/null +++ b/inputs/gcp/oslogin/google_compute_instance/restrict_external_ip/.terraform.lock.hcl @@ -0,0 +1,21 @@ +# This file is maintained automatically by "terraform init". +# Manual edits may be lost in future updates. + +provider "registry.terraform.io/hashicorp/google" { + version = "7.14.1" + hashes = [ + "h1:T3ZZsRvZxmFd9e945+QPH6Fpz2y3AM0qewPaceNyjEA=", + "zh:0006182db112098af8514fc38d9cd4e816da4145a2a0b9fb62cc9e281eb2b2a1", + "zh:60311d9770ca26c549af9a964ee6cb60ce7541b52fedfaf5f112b0931e6bcce1", + "zh:65b400c0718f6b7c5cd0fba1b2e3696d5f4f69868229627b11b0b2b94b613ade", + "zh:9ec00812dc750687610140f9a97c374492ef320eddcb669b154e1d2e8714f7f3", + "zh:adaf0486d68da121886992a3762cedffa86b611fa43294359b2a569044c462a7", + "zh:ba95c0d8279dd8e7b9294e521e461d4adaa7c171b00502be197b6c7ff4f07d65", + "zh:c216ca4b350a90c4e74e3f502ef3f35617cdd5c278e2b04ecba2bca980fb5e96", + "zh:dd7991a71477dee46c7c57f60775341524271c425ab04e66d8f2762f9b4763eb", + "zh:dd7b63b40e67b073d2acb32ee60099d884ce75bf1152a307422c47358054d170", + "zh:e5d601ca4ab813c51d897e4c2e80bf3e3565c0dd4f37f85bb91964e90ca92dfe", + "zh:f12d8f91ed783ffac9ed8d6c331e0cbe5189455fe352ba633b171b366f52e2cd", + "zh:f569b65999264a9416862bca5cd2a6177d94ccb0424f3a4ef424428912b9cb3c", + ] +} diff --git a/inputs/gcp/oslogin/google_compute_instance/twofa/.terraform.lock.hcl b/inputs/gcp/oslogin/google_compute_instance/twofa/.terraform.lock.hcl new file mode 100644 index 000000000..fb70c16e3 --- /dev/null +++ b/inputs/gcp/oslogin/google_compute_instance/twofa/.terraform.lock.hcl @@ -0,0 +1,21 @@ +# This file is maintained automatically by "terraform init". +# Manual edits may be lost in future updates. + +provider "registry.terraform.io/hashicorp/google" { + version = "7.14.1" + hashes = [ + "h1:T3ZZsRvZxmFd9e945+QPH6Fpz2y3AM0qewPaceNyjEA=", + "zh:0006182db112098af8514fc38d9cd4e816da4145a2a0b9fb62cc9e281eb2b2a1", + "zh:60311d9770ca26c549af9a964ee6cb60ce7541b52fedfaf5f112b0931e6bcce1", + "zh:65b400c0718f6b7c5cd0fba1b2e3696d5f4f69868229627b11b0b2b94b613ade", + "zh:9ec00812dc750687610140f9a97c374492ef320eddcb669b154e1d2e8714f7f3", + "zh:adaf0486d68da121886992a3762cedffa86b611fa43294359b2a569044c462a7", + "zh:ba95c0d8279dd8e7b9294e521e461d4adaa7c171b00502be197b6c7ff4f07d65", + "zh:c216ca4b350a90c4e74e3f502ef3f35617cdd5c278e2b04ecba2bca980fb5e96", + "zh:dd7991a71477dee46c7c57f60775341524271c425ab04e66d8f2762f9b4763eb", + "zh:dd7b63b40e67b073d2acb32ee60099d884ce75bf1152a307422c47358054d170", + "zh:e5d601ca4ab813c51d897e4c2e80bf3e3565c0dd4f37f85bb91964e90ca92dfe", + "zh:f12d8f91ed783ffac9ed8d6c331e0cbe5189455fe352ba633b171b366f52e2cd", + "zh:f569b65999264a9416862bca5cd2a6177d94ccb0424f3a4ef424428912b9cb3c", + ] +} diff --git a/inputs/gcp/parameter_manager/parameter/encryption/plan b/inputs/gcp/parameter_manager/parameter/encryption/plan deleted file mode 100644 index db8f136df..000000000 Binary files a/inputs/gcp/parameter_manager/parameter/encryption/plan and /dev/null differ diff --git a/inputs/gcp/parameter_manager/parameter/encryption/plan.json b/inputs/gcp/parameter_manager/parameter/encryption/plan.json deleted file mode 100644 index c6c42db31..000000000 --- a/inputs/gcp/parameter_manager/parameter/encryption/plan.json +++ /dev/null @@ -1 +0,0 @@ -{"format_version":"1.2","terraform_version":"1.9.5","planned_values":{"root_module":{"resources":[{"address":"google_parameter_manager_parameter.c","mode":"managed","type":"google_parameter_manager_parameter","name":"c","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"effective_labels":{"goog-terraform-provisioned":"true"},"format":"UNFORMATTED","kms_key":"kms-key","labels":null,"parameter_id":"parameter-c","project":"fake-project","terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"sensitive_values":{"effective_labels":{},"policy_member":[],"terraform_labels":{}}},{"address":"google_parameter_manager_parameter.nc","mode":"managed","type":"google_parameter_manager_parameter","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"effective_labels":{"goog-terraform-provisioned":"true"},"format":"UNFORMATTED","kms_key":null,"labels":null,"parameter_id":"parameter-nc","project":"fake-project","terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"sensitive_values":{"effective_labels":{},"policy_member":[],"terraform_labels":{}}}]}},"resource_changes":[{"address":"google_parameter_manager_parameter.c","mode":"managed","type":"google_parameter_manager_parameter","name":"c","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"effective_labels":{"goog-terraform-provisioned":"true"},"format":"UNFORMATTED","kms_key":"kms-key","labels":null,"parameter_id":"parameter-c","project":"fake-project","terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"after_unknown":{"create_time":true,"effective_labels":{},"id":true,"name":true,"policy_member":true,"terraform_labels":{},"update_time":true},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"policy_member":[],"terraform_labels":{}}}},{"address":"google_parameter_manager_parameter.nc","mode":"managed","type":"google_parameter_manager_parameter","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"effective_labels":{"goog-terraform-provisioned":"true"},"format":"UNFORMATTED","kms_key":null,"labels":null,"parameter_id":"parameter-nc","project":"fake-project","terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"after_unknown":{"create_time":true,"effective_labels":{},"id":true,"name":true,"policy_member":true,"terraform_labels":{},"update_time":true},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"policy_member":[],"terraform_labels":{}}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_parameter_manager_parameter.c","mode":"managed","type":"google_parameter_manager_parameter","name":"c","provider_config_key":"google","expressions":{"kms_key":{"constant_value":"kms-key"},"parameter_id":{"constant_value":"parameter-c"}},"schema_version":0},{"address":"google_parameter_manager_parameter.nc","mode":"managed","type":"google_parameter_manager_parameter","name":"nc","provider_config_key":"google","expressions":{"parameter_id":{"constant_value":"parameter-nc"}},"schema_version":0}]}},"timestamp":"2025-09-08T10:06:28Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/parameter_manager/regional_parameter/allowed_location/plan b/inputs/gcp/parameter_manager/regional_parameter/allowed_location/plan deleted file mode 100644 index a955f3ea1..000000000 Binary files a/inputs/gcp/parameter_manager/regional_parameter/allowed_location/plan and /dev/null differ diff --git a/inputs/gcp/parameter_manager/regional_parameter/allowed_location/plan.json b/inputs/gcp/parameter_manager/regional_parameter/allowed_location/plan.json deleted file mode 100644 index a369b878e..000000000 --- a/inputs/gcp/parameter_manager/regional_parameter/allowed_location/plan.json +++ /dev/null @@ -1 +0,0 @@ -{"format_version":"1.2","terraform_version":"1.9.5","planned_values":{"root_module":{"resources":[{"address":"google_parameter_manager_regional_parameter.c","mode":"managed","type":"google_parameter_manager_regional_parameter","name":"c","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"effective_labels":{"goog-terraform-provisioned":"true"},"format":"UNFORMATTED","kms_key":null,"labels":null,"location":"australia-southeast1","parameter_id":"regional_parameter_c","project":"fake-project","terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"sensitive_values":{"effective_labels":{},"policy_member":[],"terraform_labels":{}}},{"address":"google_parameter_manager_regional_parameter.nc","mode":"managed","type":"google_parameter_manager_regional_parameter","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"effective_labels":{"goog-terraform-provisioned":"true"},"format":"UNFORMATTED","kms_key":null,"labels":null,"location":"us-west1","parameter_id":"regional_parameter_nc","project":"fake-project","terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"sensitive_values":{"effective_labels":{},"policy_member":[],"terraform_labels":{}}}]}},"resource_changes":[{"address":"google_parameter_manager_regional_parameter.c","mode":"managed","type":"google_parameter_manager_regional_parameter","name":"c","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"effective_labels":{"goog-terraform-provisioned":"true"},"format":"UNFORMATTED","kms_key":null,"labels":null,"location":"australia-southeast1","parameter_id":"regional_parameter_c","project":"fake-project","terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"after_unknown":{"create_time":true,"effective_labels":{},"id":true,"name":true,"policy_member":true,"terraform_labels":{},"update_time":true},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"policy_member":[],"terraform_labels":{}}}},{"address":"google_parameter_manager_regional_parameter.nc","mode":"managed","type":"google_parameter_manager_regional_parameter","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"effective_labels":{"goog-terraform-provisioned":"true"},"format":"UNFORMATTED","kms_key":null,"labels":null,"location":"us-west1","parameter_id":"regional_parameter_nc","project":"fake-project","terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"after_unknown":{"create_time":true,"effective_labels":{},"id":true,"name":true,"policy_member":true,"terraform_labels":{},"update_time":true},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"policy_member":[],"terraform_labels":{}}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_parameter_manager_regional_parameter.c","mode":"managed","type":"google_parameter_manager_regional_parameter","name":"c","provider_config_key":"google","expressions":{"location":{"constant_value":"australia-southeast1"},"parameter_id":{"constant_value":"regional_parameter_c"}},"schema_version":0},{"address":"google_parameter_manager_regional_parameter.nc","mode":"managed","type":"google_parameter_manager_regional_parameter","name":"nc","provider_config_key":"google","expressions":{"location":{"constant_value":"us-west1"},"parameter_id":{"constant_value":"regional_parameter_nc"}},"schema_version":0}]}},"timestamp":"2025-09-08T10:06:31Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/parameter_manager/regional_parameter/encryption/plan b/inputs/gcp/parameter_manager/regional_parameter/encryption/plan deleted file mode 100644 index 5928504c8..000000000 Binary files a/inputs/gcp/parameter_manager/regional_parameter/encryption/plan and /dev/null differ diff --git a/inputs/gcp/parameter_manager/regional_parameter/encryption/plan.json b/inputs/gcp/parameter_manager/regional_parameter/encryption/plan.json deleted file mode 100644 index 21919965f..000000000 --- a/inputs/gcp/parameter_manager/regional_parameter/encryption/plan.json +++ /dev/null @@ -1 +0,0 @@ -{"format_version":"1.2","terraform_version":"1.9.5","planned_values":{"root_module":{"resources":[{"address":"google_parameter_manager_regional_parameter.c","mode":"managed","type":"google_parameter_manager_regional_parameter","name":"c","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"effective_labels":{"goog-terraform-provisioned":"true"},"format":"UNFORMATTED","kms_key":"kms-key","labels":null,"location":"australia-southeast1","parameter_id":"regional_parameter_c","project":"fake-project","terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"sensitive_values":{"effective_labels":{},"policy_member":[],"terraform_labels":{}}},{"address":"google_parameter_manager_regional_parameter.nc","mode":"managed","type":"google_parameter_manager_regional_parameter","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"effective_labels":{"goog-terraform-provisioned":"true"},"format":"UNFORMATTED","kms_key":null,"labels":null,"location":"australia-southeast1","parameter_id":"regional_parameter_nc","project":"fake-project","terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"sensitive_values":{"effective_labels":{},"policy_member":[],"terraform_labels":{}}}]}},"resource_changes":[{"address":"google_parameter_manager_regional_parameter.c","mode":"managed","type":"google_parameter_manager_regional_parameter","name":"c","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"effective_labels":{"goog-terraform-provisioned":"true"},"format":"UNFORMATTED","kms_key":"kms-key","labels":null,"location":"australia-southeast1","parameter_id":"regional_parameter_c","project":"fake-project","terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"after_unknown":{"create_time":true,"effective_labels":{},"id":true,"name":true,"policy_member":true,"terraform_labels":{},"update_time":true},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"policy_member":[],"terraform_labels":{}}}},{"address":"google_parameter_manager_regional_parameter.nc","mode":"managed","type":"google_parameter_manager_regional_parameter","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"effective_labels":{"goog-terraform-provisioned":"true"},"format":"UNFORMATTED","kms_key":null,"labels":null,"location":"australia-southeast1","parameter_id":"regional_parameter_nc","project":"fake-project","terraform_labels":{"goog-terraform-provisioned":"true"},"timeouts":null},"after_unknown":{"create_time":true,"effective_labels":{},"id":true,"name":true,"policy_member":true,"terraform_labels":{},"update_time":true},"before_sensitive":false,"after_sensitive":{"effective_labels":{},"policy_member":[],"terraform_labels":{}}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google"}},"root_module":{"resources":[{"address":"google_parameter_manager_regional_parameter.c","mode":"managed","type":"google_parameter_manager_regional_parameter","name":"c","provider_config_key":"google","expressions":{"kms_key":{"constant_value":"kms-key"},"location":{"constant_value":"australia-southeast1"},"parameter_id":{"constant_value":"regional_parameter_c"}},"schema_version":0},{"address":"google_parameter_manager_regional_parameter.nc","mode":"managed","type":"google_parameter_manager_regional_parameter","name":"nc","provider_config_key":"google","expressions":{"location":{"constant_value":"australia-southeast1"},"parameter_id":{"constant_value":"regional_parameter_nc"}},"schema_version":0}]}},"timestamp":"2025-09-08T10:06:33Z","applyable":true,"complete":true,"errored":false} diff --git a/inputs/gcp/recaptchaenterprise/key/allow_all_domains/c.tf b/inputs/gcp/recaptchaenterprise/key/allow_all_domains/c.tf index 36e6e670d..7d82b7d94 100644 --- a/inputs/gcp/recaptchaenterprise/key/allow_all_domains/c.tf +++ b/inputs/gcp/recaptchaenterprise/key/allow_all_domains/c.tf @@ -3,7 +3,7 @@ resource "google_recaptcha_enterprise_key" "c" { project = var.project - display_name = "recaptcha-web-compliant" + display_name = "c" web_settings { allow_all_domains = false @@ -15,4 +15,5 @@ resource "google_recaptcha_enterprise_key" "c" { variable "project" { type = string + default = "reliable-alpha-478205-k9" } diff --git a/inputs/gcp/recaptchaenterprise/key/allow_all_domains/nc.tf b/inputs/gcp/recaptchaenterprise/key/allow_all_domains/nc.tf index 65f3bdd11..0f9772066 100644 --- a/inputs/gcp/recaptchaenterprise/key/allow_all_domains/nc.tf +++ b/inputs/gcp/recaptchaenterprise/key/allow_all_domains/nc.tf @@ -3,7 +3,7 @@ resource "google_recaptcha_enterprise_key" "nc" { project = var.project - display_name = "recaptcha-web-noncompliant" + display_name = "nc" web_settings { allow_all_domains = true diff --git a/inputs/gcp/recaptchaenterprise/key/allow_amp_traffic/c.tf b/inputs/gcp/recaptchaenterprise/key/allow_amp_traffic/c.tf index 597bda113..aa3645af5 100644 --- a/inputs/gcp/recaptchaenterprise/key/allow_amp_traffic/c.tf +++ b/inputs/gcp/recaptchaenterprise/key/allow_amp_traffic/c.tf @@ -3,7 +3,7 @@ resource "google_recaptcha_enterprise_key" "c" { project = var.project - display_name = "recaptcha-web-compliant-allow-amp" + display_name = "c" web_settings { allow_all_domains = false @@ -17,4 +17,7 @@ resource "google_recaptcha_enterprise_key" "c" { } # Inline declaration so you can pass -var on the CLI (no new files needed) -variable "project" { type = string } +variable "project" { + type = string + default = "reliable-alpha-478205-k9" +} diff --git a/inputs/gcp/recaptchaenterprise/key/allow_amp_traffic/nc.tf b/inputs/gcp/recaptchaenterprise/key/allow_amp_traffic/nc.tf index 4cd9b6b0e..c2158a27a 100644 --- a/inputs/gcp/recaptchaenterprise/key/allow_amp_traffic/nc.tf +++ b/inputs/gcp/recaptchaenterprise/key/allow_amp_traffic/nc.tf @@ -3,7 +3,7 @@ resource "google_recaptcha_enterprise_key" "nc" { project = var.project - display_name = "recaptcha-web-noncompliant-allow-amp" + display_name = "nc" web_settings { # Keep wildcarding off so the failure is only about AMP diff --git a/inputs/gcp/recaptchaenterprise/key/challenge_security_preference/c.tf b/inputs/gcp/recaptchaenterprise/key/challenge_security_preference/c.tf index ded74ad08..d51903014 100644 --- a/inputs/gcp/recaptchaenterprise/key/challenge_security_preference/c.tf +++ b/inputs/gcp/recaptchaenterprise/key/challenge_security_preference/c.tf @@ -1,7 +1,7 @@ # Google reCAPTCHA Enterprise Key (Web) — compliant (integration_type = "SCORE") resource "google_recaptcha_enterprise_key" "c" { project = var.project - display_name = "recaptcha-web-compliant-challenge-security" + display_name = "c" web_settings { @@ -17,4 +17,7 @@ resource "google_recaptcha_enterprise_key" "c" { } # inline variable so you can pass -var from CLI -variable "project" { type = string } +variable "project" { + type = string + default = "reliable-alpha-478205-k9" +} diff --git a/inputs/gcp/recaptchaenterprise/key/challenge_security_preference/nc.tf b/inputs/gcp/recaptchaenterprise/key/challenge_security_preference/nc.tf index 4b7a06e88..ff38d2866 100644 --- a/inputs/gcp/recaptchaenterprise/key/challenge_security_preference/nc.tf +++ b/inputs/gcp/recaptchaenterprise/key/challenge_security_preference/nc.tf @@ -1,7 +1,7 @@ # Google reCAPTCHA Enterprise Key (Web) — non-compliant (integration_type != "SCORE") resource "google_recaptcha_enterprise_key" "nc" { project = var.project - display_name = "recaptcha-web-noncompliant-challenge-security" + display_name = "nc" web_settings { diff --git a/inputs/gcp/recaptchaenterprise/key/integration_type/c.tf b/inputs/gcp/recaptchaenterprise/key/integration_type/c.tf index 2768a88cd..bf95255a4 100644 --- a/inputs/gcp/recaptchaenterprise/key/integration_type/c.tf +++ b/inputs/gcp/recaptchaenterprise/key/integration_type/c.tf @@ -1,7 +1,7 @@ # Google reCAPTCHA Enterprise Key (Web) — compliant (integration_type = "SCORE") resource "google_recaptcha_enterprise_key" "c" { project = var.project - display_name = "recaptcha-web-compliant-integration-type" + display_name = "c" web_settings { allow_all_domains = false @@ -16,4 +16,7 @@ resource "google_recaptcha_enterprise_key" "c" { } # declare once per inputs folder so you can pass -var="project=..." -variable "project" { type = string } +variable "project" { + type = string + default = "reliable-alpha-478205-k9" +} diff --git a/inputs/gcp/recaptchaenterprise/key/integration_type/nc.tf b/inputs/gcp/recaptchaenterprise/key/integration_type/nc.tf index c27ca6813..f0ed1f898 100644 --- a/inputs/gcp/recaptchaenterprise/key/integration_type/nc.tf +++ b/inputs/gcp/recaptchaenterprise/key/integration_type/nc.tf @@ -1,7 +1,7 @@ # Google reCAPTCHA Enterprise Key (Web) — non-compliant (integration_type != "SCORE") resource "google_recaptcha_enterprise_key" "nc" { project = var.project - display_name = "recaptcha-web-noncompliant-integration-type" + display_name = "nc" web_settings { allow_all_domains = false diff --git a/inputs/gcp/registries/analysis_note/expiration_time/.terraform.lock.hcl b/inputs/gcp/registries/analysis_note/expiration_time/.terraform.lock.hcl index 7b27cb61a..4eb56873e 100644 --- a/inputs/gcp/registries/analysis_note/expiration_time/.terraform.lock.hcl +++ b/inputs/gcp/registries/analysis_note/expiration_time/.terraform.lock.hcl @@ -4,6 +4,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "7.3.0" hashes = [ + "h1:1WxLeVFcyCHXxeujuSS2Alr72zMqDK4IaCQlGiROuD4=", "h1:g9OBCtvJvlxtgpASGYlmHfFc2t47PS2HMDLc7+rZyv4=", "zh:135c90b063f15c090ce82d99887032e495bbe6388764b666148ae78a776c4621", "zh:47bb8721c29556b3b42f7c2ed73f8fdfb214609599ba819eebbe9ae33aab0e07", diff --git a/inputs/gcp/scc/event_threat_detection_custom_module/config/.terraform.lock.hcl b/inputs/gcp/scc/event_threat_detection_custom_module/config/.terraform.lock.hcl index 580a3ecca..d178b60fd 100644 --- a/inputs/gcp/scc/event_threat_detection_custom_module/config/.terraform.lock.hcl +++ b/inputs/gcp/scc/event_threat_detection_custom_module/config/.terraform.lock.hcl @@ -4,6 +4,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "7.3.0" hashes = [ + "h1:1WxLeVFcyCHXxeujuSS2Alr72zMqDK4IaCQlGiROuD4=", "h1:JnL0n0QEnNGhsZkzGqFb5mqW1dpZnweBftXjRKksPYs=", "zh:135c90b063f15c090ce82d99887032e495bbe6388764b666148ae78a776c4621", "zh:47bb8721c29556b3b42f7c2ed73f8fdfb214609599ba819eebbe9ae33aab0e07", diff --git a/inputs/gcp/scc/event_threat_detection_custom_module/enablement_state/plan b/inputs/gcp/scc/event_threat_detection_custom_module/enablement_state/plan deleted file mode 100644 index 096e5b03a..000000000 Binary files a/inputs/gcp/scc/event_threat_detection_custom_module/enablement_state/plan and /dev/null differ diff --git a/inputs/gcp/scc/event_threat_detection_custom_module/enablement_state/plan.json b/inputs/gcp/scc/event_threat_detection_custom_module/enablement_state/plan.json deleted file mode 100644 index 45b7b4e77..000000000 --- a/inputs/gcp/scc/event_threat_detection_custom_module/enablement_state/plan.json +++ /dev/null @@ -1,147 +0,0 @@ -{ - "format_version": "1.2", - "terraform_version": "1.9.5", - "planned_values": { - "root_module": { - "resources": [ - { - "address": "google_scc_event_threat_detection_custom_module.c", - "mode": "managed", - "type": "google_scc_event_threat_detection_custom_module", - "name": "c", - "provider_name": "registry.terraform.io/hashicorp/google", - "schema_version": 0, - "values": { - "config": "{\"ips\":[\"192.0.2.1\",\"192.0.2.0/24\"],\"metadata\":{\"description\":\"Flagged by Forcepoint as malicious\",\"recommendation\":\"Contact the owner of the relevant project.\",\"severity\":\"LOW\"}}", - "display_name": "c", - "enablement_state": "ENABLED", - "organization": "123456789", - "timeouts": null, - "type": "CONFIGURABLE_BAD_IP" - }, - "sensitive_values": {} - }, - { - "address": "google_scc_event_threat_detection_custom_module.nc", - "mode": "managed", - "type": "google_scc_event_threat_detection_custom_module", - "name": "nc", - "provider_name": "registry.terraform.io/hashicorp/google", - "schema_version": 0, - "values": { - "config": "{\"ips\":[\"192.0.2.1\",\"192.0.2.0/24\"],\"metadata\":{\"description\":\"Flagged by Forcepoint as malicious\",\"recommendation\":\"Contact the owner of the relevant project.\",\"severity\":\"LOW\"}}", - "display_name": "nc", - "enablement_state": "DISABLED", - "organization": "123456789", - "timeouts": null, - "type": "CONFIGURABLE_BAD_IP" - }, - "sensitive_values": {} - } - ] - } - }, - "resource_changes": [ - { - "address": "google_scc_event_threat_detection_custom_module.c", - "mode": "managed", - "type": "google_scc_event_threat_detection_custom_module", - "name": "c", - "provider_name": "registry.terraform.io/hashicorp/google", - "change": { - "actions": ["create"], - "before": null, - "after": { - "config": "{\"ips\":[\"192.0.2.1\",\"192.0.2.0/24\"],\"metadata\":{\"description\":\"Flagged by Forcepoint as malicious\",\"recommendation\":\"Contact the owner of the relevant project.\",\"severity\":\"LOW\"}}", - "display_name": "c", - "enablement_state": "ENABLED", - "organization": "123456789", - "timeouts": null, - "type": "CONFIGURABLE_BAD_IP" - }, - "after_unknown": { - "id": true, - "last_editor": true, - "name": true, - "update_time": true - }, - "before_sensitive": false, - "after_sensitive": {} - } - }, - { - "address": "google_scc_event_threat_detection_custom_module.nc", - "mode": "managed", - "type": "google_scc_event_threat_detection_custom_module", - "name": "nc", - "provider_name": "registry.terraform.io/hashicorp/google", - "change": { - "actions": ["create"], - "before": null, - "after": { - "config": "{\"ips\":[\"192.0.2.1\",\"192.0.2.0/24\"],\"metadata\":{\"description\":\"Flagged by Forcepoint as malicious\",\"recommendation\":\"Contact the owner of the relevant project.\",\"severity\":\"LOW\"}}", - "display_name": "nc", - "enablement_state": "DISABLED", - "organization": "123456789", - "timeouts": null, - "type": "CONFIGURABLE_BAD_IP" - }, - "after_unknown": { - "id": true, - "last_editor": true, - "name": true, - "update_time": true - }, - "before_sensitive": false, - "after_sensitive": {} - } - } - ], - "configuration": { - "provider_config": { - "google": { - "name": "google", - "full_name": "registry.terraform.io/hashicorp/google", - "version_constraint": "6.8.0" - } - }, - "root_module": { - "resources": [ - { - "address": "google_scc_event_threat_detection_custom_module.c", - "mode": "managed", - "type": "google_scc_event_threat_detection_custom_module", - "name": "c", - "provider_config_key": "google", - "expressions": { - "config": {}, - "display_name": { "constant_value": "c" }, - "enablement_state": { "constant_value": "ENABLED" }, - "organization": { "constant_value": "123456789" }, - "type": { "constant_value": "CONFIGURABLE_BAD_IP" } - }, - "schema_version": 0 - }, - { - "address": "google_scc_event_threat_detection_custom_module.nc", - "mode": "managed", - "type": "google_scc_event_threat_detection_custom_module", - "name": "nc", - "provider_config_key": "google", - "expressions": { - "config": {}, - "display_name": { "constant_value": "nc" }, - "enablement_state": { "constant_value": "DISABLED" }, - "organization": { "constant_value": "123456789" }, - "type": { "constant_value": "CONFIGURABLE_BAD_IP" } - }, - "schema_version": 0 - } - ] - } - }, - "timestamp": "2025-09-14T15:30:00Z", - "applyable": true, - "complete": true, - "errored": false -} diff --git a/inputs/gcp/scc/folder_custom_module/enablement_state/plan b/inputs/gcp/scc/folder_custom_module/enablement_state/plan deleted file mode 100644 index c096121be..000000000 Binary files a/inputs/gcp/scc/folder_custom_module/enablement_state/plan and /dev/null differ diff --git a/inputs/gcp/scc/folder_custom_module/enablement_state/plan.json b/inputs/gcp/scc/folder_custom_module/enablement_state/plan.json deleted file mode 100644 index 22989c289..000000000 --- a/inputs/gcp/scc/folder_custom_module/enablement_state/plan.json +++ /dev/null @@ -1,116 +0,0 @@ -{ - "format_version": "1.2", - "terraform_version": "1.9.5", - "planned_values": { - "root_module": { - "resources": [ - { - "address": "google_folder.folder_c", - "mode": "managed", - "type": "google_folder", - "name": "folder_c", - "provider_name": "registry.terraform.io/hashicorp/google", - "schema_version": 0, - "values": { - "deletion_protection": false, - "display_name": "c", - "parent": "organizations/123456789" - } - }, - { - "address": "google_folder.folder_nc", - "mode": "managed", - "type": "google_folder", - "name": "folder_nc", - "provider_name": "registry.terraform.io/hashicorp/google", - "schema_version": 0, - "values": { - "deletion_protection": false, - "display_name": "nc", - "parent": "organizations/123456789" - } - }, - { - "address": "google_scc_folder_custom_module.c", - "mode": "managed", - "type": "google_scc_folder_custom_module", - "name": "c", - "provider_name": "registry.terraform.io/hashicorp/google", - "schema_version": 0, - "values": { - "display_name": "c", - "enablement_state": "ENABLED" - } - }, - { - "address": "google_scc_folder_custom_module.nc", - "mode": "managed", - "type": "google_scc_folder_custom_module", - "name": "nc", - "provider_name": "registry.terraform.io/hashicorp/google", - "schema_version": 0, - "values": { - "display_name": "nc", - "enablement_state": "DISABLED" - } - } - ] - } - }, - "resource_changes": [ - { - "address": "google_folder.folder_nc", - "type": "google_folder", - "name": "folder_nc", - "change": { - "actions": ["create"], - "after": { - "deletion_protection": false, - "display_name": "nc", - "parent": "organizations/123456789" - } - } - }, - { - "address": "google_scc_folder_custom_module.nc", - "type": "google_scc_folder_custom_module", - "name": "nc", - "change": { - "actions": ["create"], - "after": { - "display_name": "nc", - "enablement_state": "DISABLED" - } - } - } - ], - "configuration": { - "root_module": { - "resources": [ - { - "address": "google_folder.folder_nc", - "mode": "managed", - "type": "google_folder", - "name": "folder_nc", - "expressions": { - "display_name": { "constant_value": "nc" }, - "parent": { "constant_value": "organizations/123456789" } - } - }, - { - "address": "google_scc_folder_custom_module.nc", - "mode": "managed", - "type": "google_scc_folder_custom_module", - "name": "nc", - "expressions": { - "display_name": { "constant_value": "nc" }, - "enablement_state": { "constant_value": "DISABLED" }, - "folder": { - "references": ["google_folder.folder_nc.folder_id"] - } - } - } - ] - } - } -} diff --git a/inputs/gcp/scc/google_scc_notification_config/allowed_organization/.terraform.lock.hcl b/inputs/gcp/scc/google_scc_notification_config/allowed_organization/.terraform.lock.hcl index b3dded37c..2e180eecf 100644 --- a/inputs/gcp/scc/google_scc_notification_config/allowed_organization/.terraform.lock.hcl +++ b/inputs/gcp/scc/google_scc_notification_config/allowed_organization/.terraform.lock.hcl @@ -4,6 +4,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "7.1.0" hashes = [ + "h1:1Asv8wk8g/aYL/eCbsWCSjaI16sFalhn+uoN1U8riyA=", "h1:cxS0ko3WVF1USu0YT2sbjCCT2oBXh/xvGQtyoKx05I4=", "zh:271095580776620d5fa21dd60859a12d9c1d83a60e116069001e3206b78f01c3", "zh:303b7aa8c040a6d1c37792e3fb298e5311635ad0c81e3f8c31e6bb6d762c3cb0", diff --git a/inputs/gcp/scc/google_scc_notification_config/pubsub_topic/.terraform.lock.hcl b/inputs/gcp/scc/google_scc_notification_config/pubsub_topic/.terraform.lock.hcl index b3dded37c..2e180eecf 100644 --- a/inputs/gcp/scc/google_scc_notification_config/pubsub_topic/.terraform.lock.hcl +++ b/inputs/gcp/scc/google_scc_notification_config/pubsub_topic/.terraform.lock.hcl @@ -4,6 +4,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "7.1.0" hashes = [ + "h1:1Asv8wk8g/aYL/eCbsWCSjaI16sFalhn+uoN1U8riyA=", "h1:cxS0ko3WVF1USu0YT2sbjCCT2oBXh/xvGQtyoKx05I4=", "zh:271095580776620d5fa21dd60859a12d9c1d83a60e116069001e3206b78f01c3", "zh:303b7aa8c040a6d1c37792e3fb298e5311635ad0c81e3f8c31e6bb6d762c3cb0", diff --git a/inputs/gcp/scc/google_scc_notification_config/streaming_config/.terraform.lock.hcl b/inputs/gcp/scc/google_scc_notification_config/streaming_config/.terraform.lock.hcl index b0909a6b6..8fde93177 100644 --- a/inputs/gcp/scc/google_scc_notification_config/streaming_config/.terraform.lock.hcl +++ b/inputs/gcp/scc/google_scc_notification_config/streaming_config/.terraform.lock.hcl @@ -4,6 +4,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "7.2.0" hashes = [ + "h1:n9j0rZHrmXEay4dYo0D+RGS7X8eQr+YZ0MupX8GaMfI=", "h1:rx4REBgSS0Bs5OQ9wEjR85a/cjKqQXYtgke6l4ORfEs=", "zh:0f036e400c90ae45289b948afb49ca938d169fb4a31d7560b345fd0ae5121407", "zh:28a7c683656178456dc7942f051df46052150cee74da7535e7ca8748a83baf30", diff --git a/inputs/gcp/scc/google_scc_organization_scc_big_query_export/big_query_export_id/.terraform.lock.hcl b/inputs/gcp/scc/google_scc_organization_scc_big_query_export/big_query_export_id/.terraform.lock.hcl index 276a68ae4..95ea5e6bb 100644 --- a/inputs/gcp/scc/google_scc_organization_scc_big_query_export/big_query_export_id/.terraform.lock.hcl +++ b/inputs/gcp/scc/google_scc_organization_scc_big_query_export/big_query_export_id/.terraform.lock.hcl @@ -5,6 +5,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "6.49.2" hashes = [ "h1:Q1oDLBM6VLi58o0GuS8gk9pPqiYniQwrypqWSzMVMdI=", + "h1:mQ3VZqZyDmfbfzqU3egFMEiVyk8nv3CNubNBi2xo2Jo=", "zh:04dbba38cc201d8f35f21c65fe5fe022b2ef30712c59d0b04df1182ee484ee29", "zh:37478f37b696e214049a7c1e397a6ebcf6b10e3652a6275c5e99ef972a0cd17f", "zh:3a68292e88e6612ed014e22d53a693859071337fcc49a244936094ae8f2b82d8", diff --git a/inputs/gcp/scc/google_scc_organization_scc_big_query_export/dataset/.terraform.lock.hcl b/inputs/gcp/scc/google_scc_organization_scc_big_query_export/dataset/.terraform.lock.hcl index 276a68ae4..95ea5e6bb 100644 --- a/inputs/gcp/scc/google_scc_organization_scc_big_query_export/dataset/.terraform.lock.hcl +++ b/inputs/gcp/scc/google_scc_organization_scc_big_query_export/dataset/.terraform.lock.hcl @@ -5,6 +5,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "6.49.2" hashes = [ "h1:Q1oDLBM6VLi58o0GuS8gk9pPqiYniQwrypqWSzMVMdI=", + "h1:mQ3VZqZyDmfbfzqU3egFMEiVyk8nv3CNubNBi2xo2Jo=", "zh:04dbba38cc201d8f35f21c65fe5fe022b2ef30712c59d0b04df1182ee484ee29", "zh:37478f37b696e214049a7c1e397a6ebcf6b10e3652a6275c5e99ef972a0cd17f", "zh:3a68292e88e6612ed014e22d53a693859071337fcc49a244936094ae8f2b82d8", diff --git a/inputs/gcp/scc/google_scc_organization_scc_big_query_export/required_filter/.terraform.lock.hcl b/inputs/gcp/scc/google_scc_organization_scc_big_query_export/required_filter/.terraform.lock.hcl index 276a68ae4..95ea5e6bb 100644 --- a/inputs/gcp/scc/google_scc_organization_scc_big_query_export/required_filter/.terraform.lock.hcl +++ b/inputs/gcp/scc/google_scc_organization_scc_big_query_export/required_filter/.terraform.lock.hcl @@ -5,6 +5,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "6.49.2" hashes = [ "h1:Q1oDLBM6VLi58o0GuS8gk9pPqiYniQwrypqWSzMVMdI=", + "h1:mQ3VZqZyDmfbfzqU3egFMEiVyk8nv3CNubNBi2xo2Jo=", "zh:04dbba38cc201d8f35f21c65fe5fe022b2ef30712c59d0b04df1182ee484ee29", "zh:37478f37b696e214049a7c1e397a6ebcf6b10e3652a6275c5e99ef972a0cd17f", "zh:3a68292e88e6612ed014e22d53a693859071337fcc49a244936094ae8f2b82d8", diff --git a/inputs/gcp/scc/google_scc_source_iam_binding/allowed_role/.terraform.lock.hcl b/inputs/gcp/scc/google_scc_source_iam_binding/allowed_role/.terraform.lock.hcl index 276a68ae4..95ea5e6bb 100644 --- a/inputs/gcp/scc/google_scc_source_iam_binding/allowed_role/.terraform.lock.hcl +++ b/inputs/gcp/scc/google_scc_source_iam_binding/allowed_role/.terraform.lock.hcl @@ -5,6 +5,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "6.49.2" hashes = [ "h1:Q1oDLBM6VLi58o0GuS8gk9pPqiYniQwrypqWSzMVMdI=", + "h1:mQ3VZqZyDmfbfzqU3egFMEiVyk8nv3CNubNBi2xo2Jo=", "zh:04dbba38cc201d8f35f21c65fe5fe022b2ef30712c59d0b04df1182ee484ee29", "zh:37478f37b696e214049a7c1e397a6ebcf6b10e3652a6275c5e99ef972a0cd17f", "zh:3a68292e88e6612ed014e22d53a693859071337fcc49a244936094ae8f2b82d8", diff --git a/inputs/gcp/scc/google_scc_source_iam_binding/members/.terraform.lock.hcl b/inputs/gcp/scc/google_scc_source_iam_binding/members/.terraform.lock.hcl index b0909a6b6..8fde93177 100644 --- a/inputs/gcp/scc/google_scc_source_iam_binding/members/.terraform.lock.hcl +++ b/inputs/gcp/scc/google_scc_source_iam_binding/members/.terraform.lock.hcl @@ -4,6 +4,7 @@ provider "registry.terraform.io/hashicorp/google" { version = "7.2.0" hashes = [ + "h1:n9j0rZHrmXEay4dYo0D+RGS7X8eQr+YZ0MupX8GaMfI=", "h1:rx4REBgSS0Bs5OQ9wEjR85a/cjKqQXYtgke6l4ORfEs=", "zh:0f036e400c90ae45289b948afb49ca938d169fb4a31d7560b345fd0ae5121407", "zh:28a7c683656178456dc7942f051df46052150cee74da7535e7ca8748a83baf30", diff --git a/inputs/gcp/scc/organization_custom_module/enablement_state/plan b/inputs/gcp/scc/organization_custom_module/enablement_state/plan deleted file mode 100644 index d02a71545..000000000 Binary files a/inputs/gcp/scc/organization_custom_module/enablement_state/plan and /dev/null differ diff --git a/inputs/gcp/scc/organization_custom_module/enablement_state/plan.json b/inputs/gcp/scc/organization_custom_module/enablement_state/plan.json deleted file mode 100644 index 0ae94819c..000000000 --- a/inputs/gcp/scc/organization_custom_module/enablement_state/plan.json +++ /dev/null @@ -1,288 +0,0 @@ -<<<<<<< HEAD -{ - "format_version": "1.2", - "terraform_version": "1.9.5", - "planned_values": { - "root_module": { - "resources": [ - { - "address": "google_scc_organization_custom_module.c", - "mode": "managed", - "type": "google_scc_organization_custom_module", - "name": "c", - "provider_name": "registry.terraform.io/hashicorp/google", - "schema_version": 0, - "values": { - "custom_config": [ - { - "custom_output": [], - "description": "The rotation period of the identified cryptokey resource exceeds 30 days.", - "predicate": [ - { - "description": null, - "expression": "resource.rotationPeriod > duration(\"2592000s\")", - "location": null, - "title": null - } - ], - "recommendation": "Set the rotation period to at most 30 days.", - "resource_selector": [ - { - "resource_types": [ - "cloudkms.googleapis.com/CryptoKey" - ] - } - ], - "severity": "MEDIUM" - } - ], - "display_name": "c", - "enablement_state": "ENABLED", - "organization": "123456789", - "timeouts": null - } - }, - { - "address": "google_scc_organization_custom_module.nc", - "mode": "managed", - "type": "google_scc_organization_custom_module", - "name": "nc", - "provider_name": "registry.terraform.io/hashicorp/google", - "schema_version": 0, - "values": { - "custom_config": [ - { - "custom_output": [], - "description": "The rotation period of the identified cryptokey resource exceeds 30 days.", - "predicate": [ - { - "description": null, - "expression": "resource.rotationPeriod > duration(\"2592000s\")", - "location": null, - "title": null - } - ], - "recommendation": "Set the rotation period to at most 30 days.", - "resource_selector": [ - { - "resource_types": [ - "cloudkms.googleapis.com/CryptoKey" - ] - } - ], - "severity": "MEDIUM" - } - ], - "display_name": "nc", - "enablement_state": "DISABLED", - "organization": "123456789", - "timeouts": null - } - } - ] - } - }, - "resource_changes": [ - { - "address": "google_scc_organization_custom_module.c", - "mode": "managed", - "type": "google_scc_organization_custom_module", - "name": "c", - "provider_name": "registry.terraform.io/hashicorp/google", - "change": { - "actions": [ - "create" - ], - "before": null, - "after": { - "custom_config": [ - { - "custom_output": [], - "description": "The rotation period of the identified cryptokey resource exceeds 30 days.", - "predicate": [ - { - "description": null, - "expression": "resource.rotationPeriod > duration(\"2592000s\")", - "location": null, - "title": null - } - ], - "recommendation": "Set the rotation period to at most 30 days.", - "resource_selector": [ - { - "resource_types": [ - "cloudkms.googleapis.com/CryptoKey" - ] - } - ], - "severity": "MEDIUM" - } - ], - "display_name": "c", - "enablement_state": "ENABLED", - "organization": "123456789", - "timeouts": null - } - } - }, - { - "address": "google_scc_organization_custom_module.nc", - "mode": "managed", - "type": "google_scc_organization_custom_module", - "name": "nc", - "provider_name": "registry.terraform.io/hashicorp/google", - "change": { - "actions": [ - "create" - ], - "before": null, - "after": { - "custom_config": [ - { - "custom_output": [], - "description": "The rotation period of the identified cryptokey resource exceeds 30 days.", - "predicate": [ - { - "description": null, - "expression": "resource.rotationPeriod > duration(\"2592000s\")", - "location": null, - "title": null - } - ], - "recommendation": "Set the rotation period to at most 30 days.", - "resource_selector": [ - { - "resource_types": [ - "cloudkms.googleapis.com/CryptoKey" - ] - } - ], - "severity": "MEDIUM" - } - ], - "display_name": "nc", - "enablement_state": "DISABLED", - "organization": "123456789", - "timeouts": null - } - } - } - ], - "configuration": { - "provider_config": { - "google": { - "name": "google", - "full_name": "registry.terraform.io/hashicorp/google", - "version_constraint": "6.8.0" - } - }, - "root_module": { - "resources": [ - { - "address": "google_scc_organization_custom_module.c", - "mode": "managed", - "type": "google_scc_organization_custom_module", - "name": "c", - "provider_config_key": "google", - "expressions": { - "custom_config": [ - { - "description": { - "constant_value": "The rotation period of the identified cryptokey resource exceeds 30 days." - }, - "predicate": [ - { - "expression": { - "constant_value": "resource.rotationPeriod > duration(\"2592000s\")" - } - } - ], - "recommendation": { - "constant_value": "Set the rotation period to at most 30 days." - }, - "resource_selector": [ - { - "resource_types": { - "constant_value": [ - "cloudkms.googleapis.com/CryptoKey" - ] - } - } - ], - "severity": { - "constant_value": "MEDIUM" - } - } - ], - "display_name": { - "constant_value": "c" - }, - "enablement_state": { - "constant_value": "ENABLED" - }, - "organization": { - "constant_value": "123456789" - } - }, - "schema_version": 0 - }, - { - "address": "google_scc_organization_custom_module.nc", - "mode": "managed", - "type": "google_scc_organization_custom_module", - "name": "nc", - "provider_config_key": "google", - "expressions": { - "custom_config": [ - { - "description": { - "constant_value": "The rotation period of the identified cryptokey resource exceeds 30 days." - }, - "predicate": [ - { - "expression": { - "constant_value": "resource.rotationPeriod > duration(\"2592000s\")" - } - } - ], - "recommendation": { - "constant_value": "Set the rotation period to at most 30 days." - }, - "resource_selector": [ - { - "resource_types": { - "constant_value": [ - "cloudkms.googleapis.com/CryptoKey" - ] - } - } - ], - "severity": { - "constant_value": "MEDIUM" - } - } - ], - "display_name": { - "constant_value": "nc" - }, - "enablement_state": { - "constant_value": "DISABLED" - }, - "organization": { - "constant_value": "123456789" - } - }, - "schema_version": 0 - } - ] - } - }, - "timestamp": "2025-05-04T23:38:32Z", - "applyable": true, - "complete": true, - "errored": false - } - -======= -{"format_version":"1.2","terraform_version":"1.9.5","planned_values":{"root_module":{"resources":[{"address":"google_scc_organization_custom_module.c","mode":"managed","type":"google_scc_organization_custom_module","name":"c","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"custom_config":[{"custom_output":[],"description":"The rotation period of the identified cryptokey resource exceeds 30 days.","predicate":[{"description":null,"expression":"resource.rotationPeriod \u003e duration(\"2592000s\")","location":null,"title":null}],"recommendation":"Set the rotation period to at most 30 days.","resource_selector":[{"resource_types":["cloudkms.googleapis.com/CryptoKey"]}],"severity":"MEDIUM"}],"display_name":"enablement_state","enablement_state":"ENABLED","organization":"123456789","timeouts":null},"sensitive_values":{"custom_config":[{"custom_output":[],"predicate":[{}],"resource_selector":[{"resource_types":[false]}]}]}},{"address":"google_scc_organization_custom_module.nc","mode":"managed","type":"google_scc_organization_custom_module","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"custom_config":[{"custom_output":[],"description":"The rotation period of the identified cryptokey resource exceeds 30 days.","predicate":[{"description":null,"expression":"resource.rotationPeriod \u003e duration(\"2592000s\")","location":null,"title":null}],"recommendation":"Set the rotation period to at most 30 days.","resource_selector":[{"resource_types":["cloudkms.googleapis.com/CryptoKey"]}],"severity":"MEDIUM"}],"display_name":"enablement_state","enablement_state":"DISABLED","organization":"123456789","timeouts":null},"sensitive_values":{"custom_config":[{"custom_output":[],"predicate":[{}],"resource_selector":[{"resource_types":[false]}]}]}}]}},"resource_changes":[{"address":"google_scc_organization_custom_module.c","mode":"managed","type":"google_scc_organization_custom_module","name":"c","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"custom_config":[{"custom_output":[],"description":"The rotation period of the identified cryptokey resource exceeds 30 days.","predicate":[{"description":null,"expression":"resource.rotationPeriod \u003e duration(\"2592000s\")","location":null,"title":null}],"recommendation":"Set the rotation period to at most 30 days.","resource_selector":[{"resource_types":["cloudkms.googleapis.com/CryptoKey"]}],"severity":"MEDIUM"}],"display_name":"enablement_state","enablement_state":"ENABLED","organization":"123456789","timeouts":null},"after_unknown":{"ancestor_module":true,"custom_config":[{"custom_output":[],"predicate":[{}],"resource_selector":[{"resource_types":[false]}]}],"id":true,"last_editor":true,"name":true,"update_time":true},"before_sensitive":false,"after_sensitive":{"custom_config":[{"custom_output":[],"predicate":[{}],"resource_selector":[{"resource_types":[false]}]}]}}},{"address":"google_scc_organization_custom_module.nc","mode":"managed","type":"google_scc_organization_custom_module","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"custom_config":[{"custom_output":[],"description":"The rotation period of the identified cryptokey resource exceeds 30 days.","predicate":[{"description":null,"expression":"resource.rotationPeriod \u003e duration(\"2592000s\")","location":null,"title":null}],"recommendation":"Set the rotation period to at most 30 days.","resource_selector":[{"resource_types":["cloudkms.googleapis.com/CryptoKey"]}],"severity":"MEDIUM"}],"display_name":"enablement_state","enablement_state":"DISABLED","organization":"123456789","timeouts":null},"after_unknown":{"ancestor_module":true,"custom_config":[{"custom_output":[],"predicate":[{}],"resource_selector":[{"resource_types":[false]}]}],"id":true,"last_editor":true,"name":true,"update_time":true},"before_sensitive":false,"after_sensitive":{"custom_config":[{"custom_output":[],"predicate":[{}],"resource_selector":[{"resource_types":[false]}]}]}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google","version_constraint":"6.8.0"}},"root_module":{"resources":[{"address":"google_scc_organization_custom_module.c","mode":"managed","type":"google_scc_organization_custom_module","name":"c","provider_config_key":"google","expressions":{"custom_config":[{"description":{"constant_value":"The rotation period of the identified cryptokey resource exceeds 30 days."},"predicate":[{"expression":{"constant_value":"resource.rotationPeriod \u003e duration(\"2592000s\")"}}],"recommendation":{"constant_value":"Set the rotation period to at most 30 days."},"resource_selector":[{"resource_types":{"constant_value":["cloudkms.googleapis.com/CryptoKey"]}}],"severity":{"constant_value":"MEDIUM"}}],"display_name":{"constant_value":"enablement_state"},"enablement_state":{"constant_value":"ENABLED"},"organization":{"constant_value":"123456789"}},"schema_version":0},{"address":"google_scc_organization_custom_module.nc","mode":"managed","type":"google_scc_organization_custom_module","name":"nc","provider_config_key":"google","expressions":{"custom_config":[{"description":{"constant_value":"The rotation period of the identified cryptokey resource exceeds 30 days."},"predicate":[{"expression":{"constant_value":"resource.rotationPeriod \u003e duration(\"2592000s\")"}}],"recommendation":{"constant_value":"Set the rotation period to at most 30 days."},"resource_selector":[{"resource_types":{"constant_value":["cloudkms.googleapis.com/CryptoKey"]}}],"severity":{"constant_value":"MEDIUM"}}],"display_name":{"constant_value":"enablement_state"},"enablement_state":{"constant_value":"DISABLED"},"organization":{"constant_value":"123456789"}},"schema_version":0}]}},"timestamp":"2025-09-08T10:06:40Z","applyable":true,"complete":true,"errored":false} ->>>>>>> dev diff --git a/inputs/gcp/scc/project_custom_module/enablement_state/plan b/inputs/gcp/scc/project_custom_module/enablement_state/plan deleted file mode 100644 index 7b2bb8c06..000000000 Binary files a/inputs/gcp/scc/project_custom_module/enablement_state/plan and /dev/null differ diff --git a/inputs/gcp/scc/project_custom_module/enablement_state/plan.json b/inputs/gcp/scc/project_custom_module/enablement_state/plan.json deleted file mode 100644 index 8b149c192..000000000 --- a/inputs/gcp/scc/project_custom_module/enablement_state/plan.json +++ /dev/null @@ -1,89 +0,0 @@ -<<<<<<< HEAD -{ - "format_version": "1.2", - "terraform_version": "1.9.5", - "planned_values": { - "root_module": { - "resources": [ - { - "address": "google_scc_project_custom_module.c", - "mode": "managed", - "type": "google_scc_project_custom_module", - "name": "c", - "provider_name": "registry.terraform.io/hashicorp/google", - "schema_version": 0, - "values": { - "custom_config": [ - { - "custom_output": [], - "description": null, - "predicate": [ - { - "description": null, - "expression": "resource.rotationPeriod > duration(\"2592000s\")", - "location": null, - "title": null - } - ], - "recommendation": "Steps to resolve violation", - "resource_selector": [ - { - "resource_types": [ - "cloudkms.googleapis.com/CryptoKey" - ] - } - ], - "severity": "LOW" - } - ], - "display_name": "c", - "enablement_state": "ENABLED", - "project": "cefwed", - "timeouts": null - } - }, - { - "address": "google_scc_project_custom_module.nc", - "mode": "managed", - "type": "google_scc_project_custom_module", - "name": "nc", - "provider_name": "registry.terraform.io/hashicorp/google", - "schema_version": 0, - "values": { - "custom_config": [ - { - "custom_output": [], - "description": null, - "predicate": [ - { - "description": null, - "expression": "resource.rotationPeriod > duration(\"2592000s\")", - "location": null, - "title": null - } - ], - "recommendation": "Steps to resolve violation", - "resource_selector": [ - { - "resource_types": [ - "cloudkms.googleapis.com/CryptoKey" - ] - } - ], - "severity": "LOW" - } - ], - "display_name": "nc", - "enablement_state": "DISABLED", - "project": "cefwed", - "timeouts": null - } - } - ] - } - } - } - -======= -{"format_version":"1.2","terraform_version":"1.9.5","planned_values":{"root_module":{"resources":[{"address":"google_scc_project_custom_module.c","mode":"managed","type":"google_scc_project_custom_module","name":"c","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"custom_config":[{"custom_output":[],"description":null,"predicate":[{"description":null,"expression":"resource.rotationPeriod \u003e duration(\"2592000s\")","location":null,"title":null}],"recommendation":"Steps to resolve violation","resource_selector":[{"resource_types":["cloudkms.googleapis.com/CryptoKey"]}],"severity":"LOW"}],"display_name":"enablement_state","enablement_state":"ENABLED","project":"cefwed","timeouts":null},"sensitive_values":{"custom_config":[{"custom_output":[],"predicate":[{}],"resource_selector":[{"resource_types":[false]}]}]}},{"address":"google_scc_project_custom_module.nc","mode":"managed","type":"google_scc_project_custom_module","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","schema_version":0,"values":{"custom_config":[{"custom_output":[],"description":null,"predicate":[{"description":null,"expression":"resource.rotationPeriod \u003e duration(\"2592000s\")","location":null,"title":null}],"recommendation":"Steps to resolve violation","resource_selector":[{"resource_types":["cloudkms.googleapis.com/CryptoKey"]}],"severity":"LOW"}],"display_name":"enablement_state","enablement_state":"DISABLED","project":"cefwed","timeouts":null},"sensitive_values":{"custom_config":[{"custom_output":[],"predicate":[{}],"resource_selector":[{"resource_types":[false]}]}]}}]}},"resource_changes":[{"address":"google_scc_project_custom_module.c","mode":"managed","type":"google_scc_project_custom_module","name":"c","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"custom_config":[{"custom_output":[],"description":null,"predicate":[{"description":null,"expression":"resource.rotationPeriod \u003e duration(\"2592000s\")","location":null,"title":null}],"recommendation":"Steps to resolve violation","resource_selector":[{"resource_types":["cloudkms.googleapis.com/CryptoKey"]}],"severity":"LOW"}],"display_name":"enablement_state","enablement_state":"ENABLED","project":"cefwed","timeouts":null},"after_unknown":{"ancestor_module":true,"custom_config":[{"custom_output":[],"predicate":[{}],"resource_selector":[{"resource_types":[false]}]}],"id":true,"last_editor":true,"name":true,"update_time":true},"before_sensitive":false,"after_sensitive":{"custom_config":[{"custom_output":[],"predicate":[{}],"resource_selector":[{"resource_types":[false]}]}]}}},{"address":"google_scc_project_custom_module.nc","mode":"managed","type":"google_scc_project_custom_module","name":"nc","provider_name":"registry.terraform.io/hashicorp/google","change":{"actions":["create"],"before":null,"after":{"custom_config":[{"custom_output":[],"description":null,"predicate":[{"description":null,"expression":"resource.rotationPeriod \u003e duration(\"2592000s\")","location":null,"title":null}],"recommendation":"Steps to resolve violation","resource_selector":[{"resource_types":["cloudkms.googleapis.com/CryptoKey"]}],"severity":"LOW"}],"display_name":"enablement_state","enablement_state":"DISABLED","project":"cefwed","timeouts":null},"after_unknown":{"ancestor_module":true,"custom_config":[{"custom_output":[],"predicate":[{}],"resource_selector":[{"resource_types":[false]}]}],"id":true,"last_editor":true,"name":true,"update_time":true},"before_sensitive":false,"after_sensitive":{"custom_config":[{"custom_output":[],"predicate":[{}],"resource_selector":[{"resource_types":[false]}]}]}}}],"configuration":{"provider_config":{"google":{"name":"google","full_name":"registry.terraform.io/hashicorp/google","version_constraint":"6.8.0"}},"root_module":{"resources":[{"address":"google_scc_project_custom_module.c","mode":"managed","type":"google_scc_project_custom_module","name":"c","provider_config_key":"google","expressions":{"custom_config":[{"predicate":[{"expression":{"constant_value":"resource.rotationPeriod \u003e duration(\"2592000s\")"}}],"recommendation":{"constant_value":"Steps to resolve violation"},"resource_selector":[{"resource_types":{"constant_value":["cloudkms.googleapis.com/CryptoKey"]}}],"severity":{"constant_value":"LOW"}}],"display_name":{"constant_value":"enablement_state"},"enablement_state":{"constant_value":"ENABLED"},"project":{"constant_value":"cefwed"}},"schema_version":0},{"address":"google_scc_project_custom_module.nc","mode":"managed","type":"google_scc_project_custom_module","name":"nc","provider_config_key":"google","expressions":{"custom_config":[{"predicate":[{"expression":{"constant_value":"resource.rotationPeriod \u003e duration(\"2592000s\")"}}],"recommendation":{"constant_value":"Steps to resolve violation"},"resource_selector":[{"resource_types":{"constant_value":["cloudkms.googleapis.com/CryptoKey"]}}],"severity":{"constant_value":"LOW"}}],"display_name":{"constant_value":"enablement_state"},"enablement_state":{"constant_value":"DISABLED"},"project":{"constant_value":"cefwed"}},"schema_version":0}]}},"timestamp":"2025-09-08T10:06:42Z","applyable":true,"complete":true,"errored":false} ->>>>>>> dev diff --git a/plan.json b/plan.json deleted file mode 100644 index e69de29bb..000000000 diff --git a/policies/gcp/API_Gateway/google_api_gateway_api_config_iam_policy/role/policy.rego b/policies/gcp/API_Gateway/google_api_gateway_api_config_iam_policy/role/policy.rego index 3f9f9497c..4b89e7a99 100644 --- a/policies/gcp/API_Gateway/google_api_gateway_api_config_iam_policy/role/policy.rego +++ b/policies/gcp/API_Gateway/google_api_gateway_api_config_iam_policy/role/policy.rego @@ -1,5 +1,5 @@ package terraform.gcp.security.api_gateway.google_api_gateway_api_config_iam_policy.role -import data.terraform.gcp.helpers +import data.terraform.helpers import data.terraform.gcp.security.api_gateway.google_api_gateway_api_config_iam_policy.vars conditions := [ diff --git a/policies/gcp/GKEHub/google_gke_hub_feature_membership/pc_enable_requied/policy.rego b/policies/gcp/GKEHub/google_gke_hub_feature_membership/pc_enabled_required/policy.rego similarity index 100% rename from policies/gcp/GKEHub/google_gke_hub_feature_membership/pc_enable_requied/policy.rego rename to policies/gcp/GKEHub/google_gke_hub_feature_membership/pc_enabled_required/policy.rego diff --git a/policies/gcp/_helpers/helpers.rego b/policies/gcp/_helpers/helpers.rego deleted file mode 100644 index 4e39a5751..000000000 --- a/policies/gcp/_helpers/helpers.rego +++ /dev/null @@ -1,587 +0,0 @@ -package data.terraform.helpers -# tested on OPA Version: 1.2.0, Rego Version: v1 - -# Defines the types of policies capable of being processed -policy_types := ["blacklist", "whitelist", "range", "pattern blacklist", "pattern whitelist"] - -#################################################### - -# NEW FUNCTIONS - -# Get resource's name; if not in values, take default "name". Checked! -get_resource_name(this_nc_resource, value_name) = resource_name if { - this_nc_resource.values[value_name] - resource_name := this_nc_resource.values[value_name] -} else = resource_name if { - resource_name := this_nc_resource[value_name] -} else = null if { - print(sprintf("Resource name for '%s' was not found! Your 'resource_value_name' in vars is wrong. Try 'resource_value_name': 'name'.", [this_nc_resource.type])) -} - -# Handle empty array blacklisting specifically -array_contains(arr, elem, pol) if { - pol == "blacklist" - [] in arr # Check if empty array is in blacklisted values - is_array(elem) - count(elem) == 0 # elem is empty -} - -# if elem is an array; checks if elem contains any blacklisted items. e.g., elem=[w, r, a], arr=[a] -> true -array_contains(arr, elem, pol) if { - is_array(elem) - pol == "blacklist" - #print(sprintf("%s", ["bb"])) - arr_to_set = {x | x := arr[_]} - elem_to_set = {x | x := elem[_]} - count(arr_to_set & elem_to_set) > 0 -} - -# if elem is an array; checks if elem is at least a subset of arr. e.g., elem=[write, read], arr=[read, write, eat] -> true -array_contains(arr, elem, pol) if { - is_array(elem) - pol == "whitelist" - #print(sprintf("%s", ["ww"])) - arr_to_set = {x | x := arr[_]} - elem_to_set = {x | x := elem[_]} - object.subset(arr_to_set, elem_to_set) -} - -# Generic helper functions: - -# Helper: Check if value exists in array -array_contains(arr, elem, pol) if { - not is_array(elem) - #print(sprintf("%s", ["a2"])) - arr[_] == elem -} - -# For resource filtering -resource_type_match(resource, resource_type) if { - resource.type == resource_type -} - -# Collect all relevant resources -get_all_resources(resource_type) = resources if -{ - resources := [ - resource | - resource := input.planned_values.root_module.resources[_] - resource_type_match(resource, resource_type) - ] -} -# Extract policy type -get_policy_type(chosen_type) = policy_type if { - policy_type := policy_types[_] - policy_type == chosen_type -} - -# Converts values from an int to a string but leaves strings as is -convert_value(x) = string if { - type_name(x) == "number" - string := sprintf("[%v]", [x]) -} - -convert_value(x) = x if { - type_name(x) == "string" -} -# Converts each entry in attribute path into a string -get_attribute_path(attribute_path) = result if { - is_array(attribute_path) - result := [ val | - x := attribute_path[_] - val := convert_value(x) - ] -} -# Returns a formatted string of any given attribute path -format_attribute_path(attribute_path) = string_path if { - is_array(attribute_path) - string_path := concat(".", get_attribute_path(attribute_path)) -} -format_attribute_path(attribute_path) = string_path if { - is_string(attribute_path) - string_path := replace(attribute_path, "_", " ") -} -array_check(values) = result if { - type := type_name(values) - type != "array" - result := [values] -} -array_check(values) = result if { - type := type_name(values) - type == "array" - result := values -} - -# Check if value is empty space -is_empty(value) if { - value == "" -} - -# empty_message: if empty, return fomratted warning -empty_message(value) = msg if { - is_empty(value) - msg = " (!!!EMPTY!!!)" -} - -# empty_message: if present, return nothing (space) -empty_message(value) = msg if { - not is_empty(value) - msg = "" -} - -#Checks a value sits between a given range of a passed object with keys upper_bound and lower_bound - -test_value_range(range_values, value) if { - test_lower_range(range_values, value) - test_upper_range(range_values, value) -} - -test_lower_range(range_values,value) = true if { - # Check value exists - not is_null(range_values.lower_bound) - value >= range_values.lower_bound -} - -# Null indicates no lower bound -test_lower_range(range_values,value) = true if { - is_null(range_values.lower_bound) -} - -test_upper_range(range_values,value) = true if { - # Check value exists - not is_null(range_values.upper_bound) - value <= range_values.upper_bound -} - -# Null indicates no higher bound -test_upper_range(range_values,value) = true if { - is_null(range_values.upper_bound) -} - -is_null_or_number(value) if { - is_null(value) # true if value is null -} - -is_null_or_number(value) if { - type_name(value) == "number" # true if value is a number -} - -# Search an array of objects for a specific key, return the value -get_value_from_array(arr, key) = value if { - some i - obj := arr[i] - obj[key] != null - value := obj[key] -} - -# Checks if a set is empty and returns a message if it is -check_empty_set(set,msg) = return if { - count(set) == 0 - return := [msg] -} -check_empty_set(set,msg) = return if { - count(set) != 0 - return := set -} - -#################################################### - -# Entry point for all policies -get_multi_summary(situations, variables) = summary if { # Samira , Patrick - # Unpack values from vars - resource_type := variables.resource_type - friendly_resource_name := variables.friendly_resource_name - value_name := variables.resource_value_name - all_resources := get_all_resources(resource_type) - violations := check_violations(resource_type, situations, friendly_resource_name, value_name) - violations_object := process_violations(violations) - formatted_message := format_violations(violations_object) - summary := { - "message": array.concat( - [sprintf("Total %s detected: %d ", [friendly_resource_name, count(all_resources)])], - formatted_message - ), - "details": violations_object - } -} else := "Policy type not supported." - -select_policy_logic(resource_type, attribute_path, values_formatted, friendly_resource_name, chosen_type, value_name) = results if { - chosen_type == policy_types[0] # Blacklist - results := get_blacklist_violations(resource_type, attribute_path, values_formatted, friendly_resource_name, value_name) -} - -select_policy_logic(resource_type, attribute_path, values_formatted, friendly_resource_name, chosen_type, value_name) = results if { - chosen_type == policy_types[1] # Whitelist - results := get_whitelist_violations(resource_type, attribute_path, values_formatted, friendly_resource_name, value_name) -} - -select_policy_logic(resource_type, attribute_path, values_formatted, friendly_resource_name, chosen_type, value_name) = results if { - chosen_type == policy_types[2] # Range (Upper and lower bounds) - values_formatted_range := format_range_input(values_formatted[0], values_formatted[1]) - results := get_range_violations(resource_type, attribute_path, values_formatted_range, friendly_resource_name, value_name) -} - -select_policy_logic(resource_type, attribute_path, values_formatted, friendly_resource_name, chosen_type, value_name) = results if { - chosen_type == policy_types[3] # Patterns (B) - results := get_pattern_blacklist_violations(resource_type, attribute_path, values_formatted, friendly_resource_name, value_name) -} - -select_policy_logic(resource_type, attribute_path, values_formatted, friendly_resource_name, chosen_type, value_name) = results if { - chosen_type == policy_types[4] # Patterns (W) - results := get_pattern_whitelist_violations(resource_type, attribute_path, values_formatted, friendly_resource_name, value_name) -} - -check_violations(resource_type, situations, friendly_resource_name, value_name) = violations if { - some i - violations := [ - msg | - msg := check_conditions(resource_type, situations[i], friendly_resource_name, value_name) - ] -} - -check_conditions(resource_type, situation, friendly_resource_name, value_name) = violations if { - messages := [ - msg | - condition := situation[_] # per cond - condition_name := condition.condition - attribute_path := condition.attribute_path - values := condition.values - pol := lower(condition.policy_type) - pol == get_policy_type(pol) # checks, leads to else - values_formatted = array_check(values) - msg := {condition_name : select_policy_logic(resource_type, attribute_path, values_formatted, friendly_resource_name, pol, value_name)} # all in - ] - sd := get_value_from_array(situation,"situation_description") - remedies := get_value_from_array(situation,"remedies") - violations := { - "situation_description": sd, - "remedies": remedies, - "all_conditions": messages #[{c1 : [{msg, nc}, {msg, nc}, ...]}, {c2 :[{msg, nc}, ...]}, ... : [...], ...}] - } -} - -process_violations(violations) = situation_summary if { - # In each set of rules, get each unique nc resource name and each violation message - situation := [ - {sit_desc : {"remedies": remedies, "conds": conds}} | - this_sit := violations[_] - sit_desc := this_sit.situation_description - remedies := this_sit.remedies - conds := this_sit.all_conditions - ] - - # There is an issue here if you use the same situation description however that shouldn't happen - - # Create a set containing only the nc resource for each situation - resource_sets := [ {sit_desc : resource_set} | - this_sit := situation[_] - some key, val in this_sit - sit_desc := key - this_condition := val.conds - resource_set := [nc | - some keyy, vall in this_condition[_] - nc := {x | x := vall[_].name}] - ] - - overall_nc_resources :=[ {sit_desc : intersec} | - this_set := resource_sets[_] - some key, val in this_set - sit_desc := key - intersec := intersection_all(val) - ] - - resource_message := [ {sit : msg} | # USE THIS - some key, val in overall_nc_resources[_] - sit := key - msg := check_empty_set(val, "All passed") - ] - # PER SITUATION - - situation_summary := [ summary | - this_sit := situation[_] - some key, val in this_sit - sit_name := key - details := val.conds - remedies := val.remedies - nc_all := object.get(resource_message[_], sit_name, null) - nc_all != null - - summary := { - "situation" : sit_name, - "remedies" : remedies, - "non_compliant_resources" : nc_all, - "details" : details - } - ] - -} - -format_violations(violations_object) = formatted_message if { - formatted_message := [ - [ sd, nc, remedies] | - some i - this_sit := violations_object[i] - sd := sprintf("Situation %d: %s",[i+1, this_sit.situation]) - resources_value := [value | - value := this_sit.non_compliant_resources[_] - ] - nc := sprintf("Non-Compliant Resources: %s", [concat(", ", resources_value)]) - remedies := sprintf("Potential Remedies: %s", [concat(", ", this_sit.remedies)]) - ] -} - -intersection_all(sets) = result if { - result = {x | - x = sets[0][_] - all_other := [s | s := sets[_]] - every s in all_other { x in s } - } -} -#################################################### - -# Policy type specific methods - -# Each policy type needs the following: -# 1. A method that formats the error message to be displayed for a non-compliant value -# 2. A method that obtains non-complaint resources -# 3. A method that calls method to obtain nc resources and for each calls the format method - -# Blacklist methods - -get_blacklisted_resources(resource_type, attribute_path, blacklisted_values) = resources if { - resources := [ - resource | - resource := input.planned_values.root_module.resources[_] - resource_type_match(resource, resource_type) - # Test array of array and deeply nested values - array_contains(blacklisted_values, object.get(resource.values, attribute_path, null), "blacklist") - ] -} - -get_blacklist_violations(resource_type, attribute_path, blacklisted_values, friendly_resource_name, value_name) = results if { - string_path := format_attribute_path(attribute_path) - results := - [ { "name": get_resource_name(this_nc_resource, value_name), - "message": msg - } | - nc_resources := get_blacklisted_resources(resource_type, attribute_path, blacklisted_values) - this_nc_resource = nc_resources[_] - this_nc_attribute = object.get(this_nc_resource.values, attribute_path, null) - msg := format_blacklist_message(friendly_resource_name, get_resource_name(this_nc_resource, value_name), string_path, this_nc_attribute, empty_message(this_nc_attribute), blacklisted_values) - ] -} - -format_blacklist_message(friendly_resource_name, resource_value_name, string_path, nc_value, empty, nc_values) = msg if { - msg := sprintf( - #Change message however we want it displayed - "%s '%s' has '%s' set to '%v'%s. This is blacklisted: %v", - [friendly_resource_name, resource_value_name, string_path, nc_value, empty, nc_values] - ) -} -#################################################### -# Whitelist methods - -format_whitelist_message(friendly_resource_name, resource_value_name, attribute_path_string, nc_value, empty, compliant_values) = msg if { - msg := sprintf( - "%s '%s' has '%s' set to '%v'%s. It should be set to '%v'", - [friendly_resource_name, resource_value_name, attribute_path_string, nc_value, empty, compliant_values] - ) -} - -get_nc_whitelisted_resources(resource_type, attribute_path, compliant_values) = resources if { - resources := [ - resource | - resource := input.planned_values.root_module.resources[_] - resource_type_match(resource, resource_type) - # Test array of array and deeply nested values - not array_contains(compliant_values, object.get(resource.values, attribute_path, null), "whitelist") - ] -} - -get_whitelist_violations(resource_type, attribute_path, compliant_values, friendly_resource_name, value_name) = results if { - string_path := format_attribute_path(attribute_path) - results := - [ { "name": get_resource_name(this_nc_resource, value_name), - "message": msg - } | - nc_resources := get_nc_whitelisted_resources(resource_type, attribute_path, compliant_values) - this_nc_resource = nc_resources[_] - this_nc_attribute = object.get(this_nc_resource.values, attribute_path, null) - msg := format_whitelist_message(friendly_resource_name, get_resource_name(this_nc_resource, value_name), string_path, this_nc_attribute, empty_message(this_nc_attribute), compliant_values) - ] -} - -#################################################### -# Range methods - -get_upper_bound(range_values) = bound if { - not is_null(range_values.upper_bound) - bound := sprintf("%v", [range_values.upper_bound]) -} -get_upper_bound(range_values) = "Inf" if { - is_null(range_values.upper_bound) -} - -get_lower_bound(range_values) = bound if { - not is_null(range_values.lower_bound) - bound := sprintf("%v", [range_values.lower_bound]) -} -get_lower_bound(range_values) = "-Inf" if { - is_null(range_values.lower_bound) -} - -format_range_validation_message(friendly_resource_name, resource_value_name, attribute_path_string, nc_value, empty, range_values) = msg if { - upper_bound := get_upper_bound(range_values) - lower_bound := get_lower_bound(range_values) - msg := sprintf( - "%s '%s' has '%s' set to '%s'%s. It should be set between '%s and %s'.", - [friendly_resource_name, resource_value_name, attribute_path_string, nc_value, empty, lower_bound, upper_bound] - ) -} - -get_nc_range_resources(resource_type, attribute_path, range_values) = resources if { - resources := [ - resource | - resource := input.planned_values.root_module.resources[_] - resource_type_match(resource, resource_type) - # Test array of array and deeply nested values - not test_value_range(range_values, to_number(object.get(resource.values, attribute_path, null))) - ] -} - -get_range_violations(resource_type, attribute_path, range_values, friendly_resource_name, value_name) = results if { - unpacked_range_values = range_values #[0] <===================================================================== removed [0] - Visal - string_path := format_attribute_path(attribute_path) - results := - [ { "name": get_resource_name(this_nc_resource, value_name), - "message": msg - } | - nc_resources := get_nc_range_resources(resource_type, attribute_path, unpacked_range_values) - this_nc_resource = nc_resources[_] - this_nc_attribute = object.get(this_nc_resource.values, attribute_path, null) - msg := format_range_validation_message(friendly_resource_name, get_resource_name(this_nc_resource, value_name), string_path, this_nc_attribute, empty_message(this_nc_attribute), unpacked_range_values) - ] -} - -format_range_input(lower,upper) = range_values if { - is_null_or_number(lower) - is_null_or_number(upper) - range_values := {"lower_bound":lower,"upper_bound":upper} -} - -format_range_validation_message( - friendly_resource_name, - resource_value_name, - attribute_path_string, - nc_value, - empty, - range_values -) = msg if { - lower := get_lower_bound(range_values) - upper := get_upper_bound(range_values) - - msg := sprintf( - "%s '%s' has '%s' set to '%v'%s. It must be between %v and %v", - [friendly_resource_name, resource_value_name, attribute_path_string, nc_value, empty, lower, upper] - ) -} - -############### REGEX - -# HELPER: gets the target * pattern -get_target_list(resource, attribute_path, target) = target_list if { - p := regex.replace(target, "\\*", "([^/]+)") - #print(sprintf("SSSSSSSSSSSSSSSSSSSSound %s", [p])) - target_value := object.get(resource.values, attribute_path, null) - matches := regex.find_all_string_submatch_n(p, target_value, 1)[0] # all matches, including main string - target_list := array.slice(matches, 1, count(matches)) # leaves every single * match except main string - #print(sprintf("SSSSSSSSSSSSSSSSSSSSound %s", [target_list])) -} else := "Wrong pattern" - -final_formatter(target, sub_pattern) = final_format if { - final_format := regex.replace(target, sub_pattern, sprintf("'%s'", [sub_pattern])) -} - -# PATTERN BLACKLIST -get_nc_pattern_blacklist(resource, attribute_path, target, patterns) = ncc if { - target_list = get_target_list(resource, attribute_path, target) # list of targetted substrings - ncc := [ - {"value": target_list[i], "allowed": patterns[i]} | - some i - array_contains(patterns[i], target_list[i], "blacklist") # direct mapping of positions of target * with its list of allowed patterns - ] -} - -get_nc_pattern_blacklist_resources(resource_type, attribute_path, values) = resources if { - resources := [ - resource | - target := values[0] # target val string - patterns := values[1] # allowed patterns (list) - resource := input.planned_values.root_module.resources[_] - resource_type_match(resource, resource_type) - count(get_nc_pattern_blacklist(resource, attribute_path, target, patterns)) > 0 # ok, there is a resource with at least one non-compliant - ] -} - -get_pattern_blacklist_violations(resource_type, attribute_path, values_formatted, friendly_resource_name, value_name) = results if { - string_path := format_attribute_path(attribute_path) - results := # and their patterns - [ { "name": get_resource_name(this_nc_resource, value_name), - "message": msg - } | - nc_resources := get_nc_pattern_blacklist_resources(resource_type, attribute_path, values_formatted) - this_nc_resource = nc_resources[_] - nc := get_nc_pattern_blacklist(this_nc_resource, attribute_path, values_formatted[0], values_formatted[1]) - this_nc := nc[_] - msg := format_pattern_blacklist_message(friendly_resource_name, get_resource_name(this_nc_resource, value_name), string_path, final_formatter(object.get(this_nc_resource.values, attribute_path, null), this_nc.value), empty_message(this_nc.value), this_nc.allowed) - ] -} - -format_pattern_blacklist_message(friendly_resource_name, resource_value_name, attribute_path_string, nc_value, empty, allowed_values) = msg if { - msg := sprintf( - "%s '%s' has '%s' set to '%s'%s. This is blacklisted: %s", - [friendly_resource_name, resource_value_name, attribute_path_string, nc_value, empty, allowed_values] - ) -} - -# PATTERN WHITELIST (clone of blacklist, but not array_contains() -get_nc_pattern_whitelist(resource, attribute_path, target, patterns) = ncc if { - target_list = get_target_list(resource, attribute_path, target) # list of targetted substrings - ncc := [ - {"value": target_list[i], "allowed": patterns[i]} | - some i - not array_contains(patterns[i], target_list[i], "whitelist") # direct mapping of positions of target * with its list of allowed patterns - ] -} - -get_nc_pattern_whitelist_resources(resource_type, attribute_path, values) = resources if { - resources := [ - resource | - target := values[0] # target val string - patterns := values[1] # allowed patterns (list) - resource := input.planned_values.root_module.resources[_] - resource_type_match(resource, resource_type) - count(get_nc_pattern_whitelist(resource, attribute_path, target, patterns)) > 0 # ok, there is a resource with at least one non-compliant - ] -} - -get_pattern_whitelist_violations(resource_type, attribute_path, values_formatted, friendly_resource_name, value_name) = results if { - string_path := format_attribute_path(attribute_path) - results := # and their patterns - [ { "name": get_resource_name(this_nc_resource, value_name), - "message": msg - } | - nc_resources := get_nc_pattern_whitelist_resources(resource_type, attribute_path, values_formatted) - this_nc_resource = nc_resources[_] - nc := get_nc_pattern_whitelist(this_nc_resource, attribute_path, values_formatted[0], values_formatted[1]) - this_nc := nc[_] - msg := format_pattern_whitelist_message(friendly_resource_name, get_resource_name(this_nc_resource, value_name), string_path, final_formatter(object.get(this_nc_resource.values, attribute_path, null), this_nc.value), empty_message(this_nc.value), this_nc.allowed) - ] -} - -format_pattern_whitelist_message(friendly_resource_name, resource_value_name, attribute_path_string, nc_value, empty, allowed_values) = msg if { - msg := sprintf( - "%s '%s' has '%s' set to '%s'%s. It should be set to one of: %s", - [friendly_resource_name, resource_value_name, attribute_path_string, nc_value, empty, allowed_values] - ) -} diff --git a/policies/gcp/API_Gateway/google_api_gateway_api_config_iam_policy/member/policy.rego b/policies/gcp/api_gateway/google_api_gateway_api_config_iam_policy/members/policy.rego similarity index 100% rename from policies/gcp/API_Gateway/google_api_gateway_api_config_iam_policy/member/policy.rego rename to policies/gcp/api_gateway/google_api_gateway_api_config_iam_policy/members/policy.rego diff --git a/policies/gcp/api_hub/google_apihub_curation/location/policy.rego b/policies/gcp/api_hub/google_apihub_curation/location/policy.rego new file mode 100644 index 000000000..e28011ff6 --- /dev/null +++ b/policies/gcp/api_hub/google_apihub_curation/location/policy.rego @@ -0,0 +1,20 @@ +package terraform.gcp.security.api_hub.google_apihub_curation.location + +import data.terraform.helpers +import data.terraform.gcp.security.api_hub.google_apihub_curation.vars + +conditions := [[ + { + "situation_description": "Location must be australia-southeast1 (Melbourne) and australia-southeast2 (Sydney).", + "remedies": ["Set google_apihub_curation.location to \"australia-southeast1\"."] + }, + { + "condition": "Location is not australia-southeast1", + "attribute_path": ["location"], + "values": ["australia-southeast1"], + "policy_type": "whitelist" + } +]] + +message := helpers.get_multi_summary(conditions, vars.variables).message +details := helpers.get_multi_summary(conditions, vars.variables).details \ No newline at end of file diff --git a/policies/gcp/chronicle/watchlist/multiplying_factor/policy.rego b/policies/gcp/chronicle/watchlist/multiplying_factor/policy.rego index c35b493e0..4d7e3e4da 100644 --- a/policies/gcp/chronicle/watchlist/multiplying_factor/policy.rego +++ b/policies/gcp/chronicle/watchlist/multiplying_factor/policy.rego @@ -15,7 +15,7 @@ conditions := [ { "condition": "Ensure multiplying_factor is greater than or equal to 1.0", "attribute_path": ["multiplying_factor"], - "values": [1.0, null], + "values": [0.5, 1.0], "policy_type": "range" } ] diff --git a/policies/gcp/cloud_platform_service/google_project/org_id/policy.rego b/policies/gcp/cloud_platform_service/google_project/org_id/policy.rego index ccc48f5ad..2334173fe 100644 --- a/policies/gcp/cloud_platform_service/google_project/org_id/policy.rego +++ b/policies/gcp/cloud_platform_service/google_project/org_id/policy.rego @@ -14,13 +14,6 @@ conditions := [ "attribute_path": ["org_id"], "values": [null], "policy_type": "blacklist" - }, - - { - "condition": "folder_id is null", - "attribute_path": ["folder_id"], - "values": [null], - "policy_type": "blacklist" } ] ] diff --git a/policies/gcp/cloud_platform_service/google_project/vars.rego b/policies/gcp/cloud_platform_service/google_project/vars.rego index 46d8afce7..acdf8e35f 100644 --- a/policies/gcp/cloud_platform_service/google_project/vars.rego +++ b/policies/gcp/cloud_platform_service/google_project/vars.rego @@ -4,5 +4,5 @@ package terraform.gcp.security.cloud_platform_service.google_project.vars variables := { "friendly_resource_name": "GCP Project", "resource_type": "google_project", - "resource_value_name": "name" + "resource_value_name": "name", } diff --git a/policies/gcp/cloud_vmware_engine/external_access_rule/block_broad_external_access/policy.rego b/policies/gcp/cloud_vmware_engine/external_access_rule/block_broad_external_access/policy.rego index 0bd09548f..5f6fd2feb 100644 --- a/policies/gcp/cloud_vmware_engine/external_access_rule/block_broad_external_access/policy.rego +++ b/policies/gcp/cloud_vmware_engine/external_access_rule/block_broad_external_access/policy.rego @@ -5,7 +5,7 @@ import data.terraform.gcp.security.cloud_vmware_engine.external_access_rule.vars conditions := [[ { - "situation_description": "ip range is too broad", + "situation_description": "Network configuration is too broad", "remedies": ["Set ip range for required ips and make sure that all ports are not opened"], }, { @@ -17,7 +17,7 @@ conditions := [[ { "condition": "c2 valid for tcp or udp", "attribute_path": ["ip_protocol"], - "values": ["TCP", "UDP"], + "values": ["UDP"], "policy_type": "blacklist", }, { diff --git a/policies/gcp/dataform/google_dataform_repository/deletion_policy/policy.rego b/policies/gcp/dataform/google_dataform_repository/deletion_policy/policy.rego index 156d25ea5..f56fa10c1 100644 --- a/policies/gcp/dataform/google_dataform_repository/deletion_policy/policy.rego +++ b/policies/gcp/dataform/google_dataform_repository/deletion_policy/policy.rego @@ -1,7 +1,7 @@ package terraform.gcp.security.dataform.google_dataform_repository.deletion_policy import data.terraform.helpers -import data.terraform.gcp.security.dataform.google_dataform_repository as repo +import data.terraform.gcp.security.dataform.google_dataform_repository.vars # Disallow FORCE deletion policy on Dataform repositories. # One simple situation: any repo with deletion_policy == "FORCE" is non-compliant. @@ -24,5 +24,7 @@ conditions := [ ] ] -message := helpers.get_multi_summary(conditions, repo.variables).message -details := helpers.get_multi_summary(conditions, repo.variables).details +result := helpers.get_multi_summary(conditions, vars.variables) + +message := result.message +details := result.details diff --git a/policies/gcp/dataform/google_dataform_repository/encryption/policy.rego b/policies/gcp/dataform/google_dataform_repository/encryption/policy.rego index d003e127b..1f14e6f68 100644 --- a/policies/gcp/dataform/google_dataform_repository/encryption/policy.rego +++ b/policies/gcp/dataform/google_dataform_repository/encryption/policy.rego @@ -1,7 +1,7 @@ package terraform.gcp.security.dataform.google_dataform_repository.encryption import data.terraform.helpers -import data.terraform.gcp.security.dataform.google_dataform_repository as repo +import data.terraform.gcp.security.dataform.google_dataform_repository.vars # Require CMEK on repositories (kms_key_name must be set) @@ -23,5 +23,7 @@ conditions := [ ] ] -message := helpers.get_multi_summary(conditions, repo.variables).message -details := helpers.get_multi_summary(conditions, repo.variables).details \ No newline at end of file +result := helpers.get_multi_summary(conditions, vars.variables) + +message := result.message +details := result.details \ No newline at end of file diff --git a/policies/gcp/dataform/google_dataform_repository/git_https_secret/policy.rego b/policies/gcp/dataform/google_dataform_repository/git_https_secret/policy.rego index 17eff93c1..5fe3d0e9f 100644 --- a/policies/gcp/dataform/google_dataform_repository/git_https_secret/policy.rego +++ b/policies/gcp/dataform/google_dataform_repository/git_https_secret/policy.rego @@ -1,7 +1,7 @@ package terraform.gcp.security.dataform.google_dataform_repository.git_https_secret import data.terraform.helpers -import data.terraform.gcp.security.dataform.google_dataform_repository as repo +import data.terraform.gcp.security.dataform.google_dataform_repository.vars # Situation: If a Git remote is configured over HTTPS, # then an HTTPS token secret must be provided. @@ -21,7 +21,7 @@ conditions := [ { "condition": "Git remote is configured", "attribute_path": ["git_remote_settings"], - "policy_type": "whitelist", + "policy_type": "blacklist", "values": [null, []] }, { @@ -33,5 +33,7 @@ conditions := [ ] ] -message := helpers.get_multi_summary(conditions, repo.variables).message -details := helpers.get_multi_summary(conditions, repo.variables).details +result := helpers.get_multi_summary(conditions, vars.variables) + +message := result.message +details := result.details diff --git a/policies/gcp/dataform/google_dataform_repository/git_required/policy.rego b/policies/gcp/dataform/google_dataform_repository/git_required/policy.rego index ebd9b5f2f..3e82b46f3 100644 --- a/policies/gcp/dataform/google_dataform_repository/git_required/policy.rego +++ b/policies/gcp/dataform/google_dataform_repository/git_required/policy.rego @@ -1,7 +1,7 @@ package terraform.gcp.security.dataform.google_dataform_repository.git_required import data.terraform.helpers -import data.terraform.gcp.security.dataform.google_dataform_repository as repo +import data.terraform.gcp.security.dataform.google_dataform_repository.vars # This policy enforces: if a repo configures git_remote_settings, # then BOTH `url` and `default_branch` must be set (non-empty). @@ -22,7 +22,7 @@ conditions := [ { "condition": "Git remote is configured", "attribute_path": ["git_remote_settings"], - "policy_type": "whitelist", + "policy_type": "blacklist", "values": [null, []] }, { @@ -44,7 +44,7 @@ conditions := [ { "condition": "Git remote is configured", "attribute_path": ["git_remote_settings"], - "policy_type": "whitelist", + "policy_type": "blacklist", "values": [null, []] }, { @@ -56,5 +56,7 @@ conditions := [ ] ] -message := helpers.get_multi_summary(conditions, repo.variables).message -details := helpers.get_multi_summary(conditions, repo.variables).details +result := helpers.get_multi_summary(conditions, vars.variables) + +message := result.message +details := result.details \ No newline at end of file diff --git a/policies/gcp/dataform/google_dataform_repository/git_ssh_auth/policy.rego b/policies/gcp/dataform/google_dataform_repository/git_ssh_auth/policy.rego index e0a9fcd07..4c87f86d7 100644 --- a/policies/gcp/dataform/google_dataform_repository/git_ssh_auth/policy.rego +++ b/policies/gcp/dataform/google_dataform_repository/git_ssh_auth/policy.rego @@ -1,7 +1,7 @@ package terraform.gcp.security.dataform.google_dataform_repository.git_ssh_auth import data.terraform.helpers -import data.terraform.gcp.security.dataform.google_dataform_repository as repo +import data.terraform.gcp.security.dataform.google_dataform_repository.vars # This policy enforces: if a repo uses SSH authentication, # then both user_private_key_secret_version and host_public_key must be set. @@ -20,12 +20,6 @@ conditions := [ "Ensure the private key is stored securely in Google Secret Manager." ] }, - { - "condition": "SSH authentication is configured", - "attribute_path": ["git_remote_settings", 0, "ssh_authentication_config"], - "policy_type": "whitelist", - "values": [null, []] - }, { "condition": "SSH private key secret must be set", "attribute_path": ["git_remote_settings", 0, "ssh_authentication_config", 0, "user_private_key_secret_version"], @@ -43,12 +37,6 @@ conditions := [ "This protects against MITM attacks by pinning the trusted host key." ] }, - { - "condition": "SSH authentication is configured", - "attribute_path": ["git_remote_settings", 0, "ssh_authentication_config"], - "policy_type": "whitelist", - "values": [null, []] - }, { "condition": "SSH host public key must be set", "attribute_path": ["git_remote_settings", 0, "ssh_authentication_config", 0, "host_public_key"], @@ -58,5 +46,7 @@ conditions := [ ] ] -message := helpers.get_multi_summary(conditions, repo.variables).message -details := helpers.get_multi_summary(conditions, repo.variables).details +result := helpers.get_multi_summary(conditions, vars.variables) + +message := result.message +details := result.details diff --git a/policies/gcp/dataform/google_dataform_repository/labels_security_required/policy.rego b/policies/gcp/dataform/google_dataform_repository/labels_security_required/policy.rego index 3b75eb362..3474b2760 100644 --- a/policies/gcp/dataform/google_dataform_repository/labels_security_required/policy.rego +++ b/policies/gcp/dataform/google_dataform_repository/labels_security_required/policy.rego @@ -1,7 +1,7 @@ package terraform.gcp.security.dataform.google_dataform_repository.labels_security_required import data.terraform.helpers -import data.terraform.gcp.security.dataform.google_dataform_repository as repo +import data.terraform.gcp.security.dataform.google_dataform_repository.vars # Security-oriented required labels required_label_keys := [ @@ -54,7 +54,10 @@ value_conditions := [ conditions := array.concat(presence_conditions, value_conditions) -message := helpers.get_multi_summary(conditions, repo.variables).message -details := helpers.get_multi_summary(conditions, repo.variables).details +result := helpers.get_multi_summary(conditions, vars.variables) + +message := result.message +details := result.details + diff --git a/policies/gcp/dataform/google_dataform_repository/region_allowlist/policy.rego b/policies/gcp/dataform/google_dataform_repository/region_allowlist/policy.rego index 71f939f12..2bb8fe76b 100644 --- a/policies/gcp/dataform/google_dataform_repository/region_allowlist/policy.rego +++ b/policies/gcp/dataform/google_dataform_repository/region_allowlist/policy.rego @@ -1,7 +1,7 @@ package terraform.gcp.security.dataform.google_dataform_repository.region_allowlist import data.terraform.helpers -import data.terraform.gcp.security.dataform.google_dataform_repository as repo +import data.terraform.gcp.security.dataform.google_dataform_repository.vars # Adjust the allowlist as needed approved_regions := ["australia-southeast1"] @@ -23,5 +23,7 @@ conditions := [ ] ] -message := helpers.get_multi_summary(conditions, repo.variables).message -details := helpers.get_multi_summary(conditions, repo.variables).details \ No newline at end of file +result := helpers.get_multi_summary(conditions, vars.variables) + +message := result.message +details := result.details \ No newline at end of file diff --git a/policies/gcp/dataform/google_dataform_repository/vars.rego b/policies/gcp/dataform/google_dataform_repository/vars.rego index c7fa3e68f..d1fcbf744 100644 --- a/policies/gcp/dataform/google_dataform_repository/vars.rego +++ b/policies/gcp/dataform/google_dataform_repository/vars.rego @@ -1,4 +1,4 @@ -package terraform.gcp.security.dataform.google_dataform_repository +package terraform.gcp.security.dataform.google_dataform_repository.vars variables := { "resource_type": "google_dataform_repository", diff --git a/policies/gcp/dataform/google_dataform_repository_iam/iam_no_public/policy.rego b/policies/gcp/dataform/google_dataform_repository_iam/iam_no_public/policy.rego index 2ad86da13..bb8d5c8bd 100644 --- a/policies/gcp/dataform/google_dataform_repository_iam/iam_no_public/policy.rego +++ b/policies/gcp/dataform/google_dataform_repository_iam/iam_no_public/policy.rego @@ -1,8 +1,7 @@ package terraform.gcp.security.dataform.google_dataform_repository_iam.iam_no_public import data.terraform.helpers -import data.terraform.gcp.security.dataform.google_dataform_repository_iam as repo - +import data.terraform.gcp.security.dataform.google_dataform_repository_iam.vars # Disallow public principals on repository IAM bindings conditions := [ @@ -23,5 +22,7 @@ conditions := [ ] ] -message := helpers.get_multi_summary(conditions, repo.variables).message -details := helpers.get_multi_summary(conditions, repo.variables).details \ No newline at end of file +result := helpers.get_multi_summary(conditions, vars.variables) + +message := result.message +details := result.details \ No newline at end of file diff --git a/policies/gcp/dataform/google_dataform_repository_iam/vars.rego b/policies/gcp/dataform/google_dataform_repository_iam/vars.rego index 2e36fc7a2..4e40f982f 100644 --- a/policies/gcp/dataform/google_dataform_repository_iam/vars.rego +++ b/policies/gcp/dataform/google_dataform_repository_iam/vars.rego @@ -1,4 +1,4 @@ -package terraform.gcp.security.dataform.google_dataform_repository_iam +package terraform.gcp.security.dataform.google_dataform_repository_iam.vars variables := { "resource_type": "google_dataform_repository_iam_binding", diff --git a/policies/gcp/dataform/google_dataform_repository_release_config/cron_required/policy.rego b/policies/gcp/dataform/google_dataform_repository_release_config/cron_required/policy.rego index 63df6e5ba..4481633a5 100644 --- a/policies/gcp/dataform/google_dataform_repository_release_config/cron_required/policy.rego +++ b/policies/gcp/dataform/google_dataform_repository_release_config/cron_required/policy.rego @@ -1,7 +1,7 @@ package terraform.gcp.security.dataform.google_dataform_repository_release_config.cron_required import data.terraform.helpers -import data.terraform.gcp.security.dataform.google_dataform_repository_release_config as repo +import data.terraform.gcp.security.dataform.google_dataform_repository_release_config.vars conditions := [ [ @@ -20,5 +20,7 @@ conditions := [ ] ] -message := helpers.get_multi_summary(conditions, repo.variables).message -details := helpers.get_multi_summary(conditions, repo.variables).details \ No newline at end of file +result := helpers.get_multi_summary(conditions, vars.variables) + +message := result.message +details := result.details \ No newline at end of file diff --git a/policies/gcp/dataform/google_dataform_repository_release_config/vars.rego b/policies/gcp/dataform/google_dataform_repository_release_config/vars.rego index 378c727d5..0ba445e46 100644 --- a/policies/gcp/dataform/google_dataform_repository_release_config/vars.rego +++ b/policies/gcp/dataform/google_dataform_repository_release_config/vars.rego @@ -1,4 +1,4 @@ -package terraform.gcp.security.dataform.google_dataform_repository_release_config +package terraform.gcp.security.dataform.google_dataform_repository_release_config.vars variables := { "resource_type": "google_dataform_repository_release_config", diff --git a/policies/gcp/dataform/google_dataform_repository_workflow_config/service_account_required/policy.rego b/policies/gcp/dataform/google_dataform_repository_workflow_config/service_account_required/policy.rego index 4f230fdab..4ba3cbd3d 100644 --- a/policies/gcp/dataform/google_dataform_repository_workflow_config/service_account_required/policy.rego +++ b/policies/gcp/dataform/google_dataform_repository_workflow_config/service_account_required/policy.rego @@ -1,7 +1,7 @@ package terraform.gcp.security.dataform.google_dataform_repository_workflow_config.service_account_required import data.terraform.helpers -import data.terraform.gcp.security.dataform.google_dataform_repository_workflow_config as repo +import data.terraform.gcp.security.dataform.google_dataform_repository_workflow_config.vars # Require a service account in invocation_config # NOTE: Terraform encodes nested blocks as single-element arrays in plan JSON. @@ -16,12 +16,6 @@ conditions := [ "Ensure the service account has required permissions to execute Dataform actions" ] }, - { - "condition": "invocation_config is configured", - "attribute_path": ["invocation_config"], - "policy_type": "whitelist", - "values": [null, []] - }, { "condition": "service_account must be set", "attribute_path": ["invocation_config", 0, "service_account"], @@ -31,5 +25,7 @@ conditions := [ ] ] -message := helpers.get_multi_summary(conditions, repo.variables).message -details := helpers.get_multi_summary(conditions, repo.variables).details \ No newline at end of file +result := helpers.get_multi_summary(conditions, vars.variables) + +message := result.message +details := result.details \ No newline at end of file diff --git a/policies/gcp/dataform/google_dataform_repository_workflow_config/vars.rego b/policies/gcp/dataform/google_dataform_repository_workflow_config/vars.rego index e04511b82..033e9eeea 100644 --- a/policies/gcp/dataform/google_dataform_repository_workflow_config/vars.rego +++ b/policies/gcp/dataform/google_dataform_repository_workflow_config/vars.rego @@ -1,4 +1,4 @@ -package terraform.gcp.security.dataform.google_dataform_repository_workflow_config +package terraform.gcp.security.dataform.google_dataform_repository_workflow_config.vars # Expose only google_dataform_repository_workflow_config resources variables = { diff --git a/policies/gcp/dataproc_metastore/federation/deletion_protection/policy.rego b/policies/gcp/dataproc_metastore/federation/deletion_protection/policy.rego index f897be2d7..c3400bdbe 100644 --- a/policies/gcp/dataproc_metastore/federation/deletion_protection/policy.rego +++ b/policies/gcp/dataproc_metastore/federation/deletion_protection/policy.rego @@ -12,7 +12,7 @@ conditions := [ { "condition": "Checks that deletion_protection is disabled.", "attribute_path": ["deletion_protection"], - "values": [false], + "values": [true], "policy_type": "blacklist" } ] diff --git a/policies/gcp/dataproc_metastore/federation/metastore_type/policy.rego b/policies/gcp/dataproc_metastore/federation/metastore_type/policy.rego index 3ba841ed9..c50885b39 100644 --- a/policies/gcp/dataproc_metastore/federation/metastore_type/policy.rego +++ b/policies/gcp/dataproc_metastore/federation/metastore_type/policy.rego @@ -12,7 +12,7 @@ conditions := [ }, { "condition": "Checks that metastore_type is in the approved list.", - "attribute_path": ["backend_metastore", 0, "metastore_type" ], + "attribute_path": ["backend_metastores", 0, "metastore_type" ], "values": ["DATAPROC_METASTORE", "BIGQUERY"], "policy_type": "whitelist" } diff --git a/policies/gcp/dataproc_metastore/federation/name/policy.rego b/policies/gcp/dataproc_metastore/federation/name/policy.rego index a3ee65605..94ab58b07 100644 --- a/policies/gcp/dataproc_metastore/federation/name/policy.rego +++ b/policies/gcp/dataproc_metastore/federation/name/policy.rego @@ -4,20 +4,17 @@ import data.terraform.helpers import data.terraform.gcp.security.dataproc_metastore.federation.vars -# STEP 1: STUDY YOUR RESOURCE AND ITS ATTRIBUTES, THEN FILL IN THE VARS FILE - -# STEP 2: CREATE SCENARIOS (can be simple (one condition) or complex (multiple linked conditions) ) conditions := [ [ { "situation_description": "Check that the relative resource name resides in the correct region", - "remedies": ["Update reigion to australia-southeast1/2"] + "remedies": ["Update region to australia-southeast1/2"] }, { "condition": "Test version of Apache Hive metastore", "attribute_path": ["backend_metastores", 0, "name"], - "values": ["projects/acme-data-01/locations/*/services/hive-prod", [["australia-southeast2", "australia-southeast1"]]], - "policy_type": "pattern_whitelist" + "values": ["projects/acme-data-01/locations/australia-southeast1/services/test", "projects/acme-data-01/locations/australia-southeast2/services/test"], + "policy_type": "whitelist" } ] ] diff --git a/policies/gcp/dataproc_metastore/federation/vars.rego b/policies/gcp/dataproc_metastore/federation/vars.rego index bb2f69710..b3bd08be3 100644 --- a/policies/gcp/dataproc_metastore/federation/vars.rego +++ b/policies/gcp/dataproc_metastore/federation/vars.rego @@ -3,5 +3,5 @@ package terraform.gcp.security.dataproc_metastore.federation.vars variables := { "friendly_resource_name": "DPM federation", "resource_type": "google_dataproc_metastore_federation", - "resource_value_name" : "name" + "resource_value_name" : "federation_id" } diff --git a/policies/gcp/dataproc_metastore/service/database_type/policy.rego b/policies/gcp/dataproc_metastore/service/database_type/policy.rego index ed94e8ecc..c522f5c47 100644 --- a/policies/gcp/dataproc_metastore/service/database_type/policy.rego +++ b/policies/gcp/dataproc_metastore/service/database_type/policy.rego @@ -12,7 +12,7 @@ conditions := [ { "condition": "check database type is compliant", "attribute_path": ["database_type"], - "values": ["MYSQL","SPANNER"], + "values": ["MYSQL"], "policy_type": "whitelist" } ] diff --git a/policies/gcp/dataproc_metastore/service/encryption_config/policy.rego b/policies/gcp/dataproc_metastore/service/encryption_config/policy.rego index ad601394d..c9e4b659a 100644 --- a/policies/gcp/dataproc_metastore/service/encryption_config/policy.rego +++ b/policies/gcp/dataproc_metastore/service/encryption_config/policy.rego @@ -5,13 +5,13 @@ import data.terraform.gcp.security.dataproc_metastore.service.vars conditions := [ [ - {"situation_description" : "To ensure data encryption make sure kms key is located in Australiancregions ", + {"situation_description" : "To ensure data encryption make sure kms key is located in Australian regions ", "remedies":[ "Change kms key location to reside in australia-southeast1 or australia-southeast2 "]}, { "condition": "A message about what the condition does", "attribute_path" : ["encryption_config", 0, "kms_key"], - "values" : ["projects-example/*/dpm-ring/metastore-cmek/",[["australia-southeast1", "australia-southeast2"]]], - "policy_type" : "patern_whitelist" + "values" : ["projects-example/australia-southeast1/dpm-ring/metastore-cmek/", "projects-example/australia-southeast2/dpm-ring/metastore-cmek/"], + "policy_type" : "whitelist" } ] ] diff --git a/policies/gcp/dataproc_metastore/service/metadata_integration/policy.rego b/policies/gcp/dataproc_metastore/service/metadata_integration/policy.rego index d42b3e96d..016eeda3c 100644 --- a/policies/gcp/dataproc_metastore/service/metadata_integration/policy.rego +++ b/policies/gcp/dataproc_metastore/service/metadata_integration/policy.rego @@ -9,8 +9,8 @@ conditions := [ "remedies":[ "Set metadata intergration, data catalog, enabled to true"]}, { "condition": "Data catalog sync enabled", - "attribute_path" : ["data_catalog_config", 0, "enabled"], - "values" : ["true"], + "attribute_path" : ["metadata_integration", 0, "data_catalog_config", 0, "enabled"], + "values" : [true], "policy_type" : "whitelist" } ] diff --git a/policies/gcp/dataproc_metastore/service/port/policy.rego b/policies/gcp/dataproc_metastore/service/port/policy.rego index 45dd5100b..f75e431b5 100644 --- a/policies/gcp/dataproc_metastore/service/port/policy.rego +++ b/policies/gcp/dataproc_metastore/service/port/policy.rego @@ -11,7 +11,7 @@ conditions := [ { "condition": "Check if the metastore port is set to the default (9083).", "attribute_path": ["port"], - "values": ["9083", "443"], + "values": [9083], "policy_type": "whitelist" } ] diff --git a/policies/gcp/dataproc_metastore/service/vars.rego b/policies/gcp/dataproc_metastore/service/vars.rego index 56254ccfb..cfa0ea270 100644 --- a/policies/gcp/dataproc_metastore/service/vars.rego +++ b/policies/gcp/dataproc_metastore/service/vars.rego @@ -4,5 +4,5 @@ package terraform.gcp.security.dataproc_metastore.service.vars variables := { "friendly_resource_name": "DPM service", "resource_type": "google_dataproc_metastore_service", - "resource_value_name" : "name" + "resource_value_name" : "service_id" } diff --git a/policies/gcp/firebase_app_hosting/build/container_image/policy.rego b/policies/gcp/firebase_app_hosting/build/container_image/policy.rego index 5b88b30ff..ee4e4a170 100644 --- a/policies/gcp/firebase_app_hosting/build/container_image/policy.rego +++ b/policies/gcp/firebase_app_hosting/build/container_image/policy.rego @@ -1,6 +1,5 @@ package terraform.gcp.security.firebase_app_hosting.build.container_image - -import data.terraform.gcp.helpers +import data.terraform.helpers import data.terraform.gcp.security.firebase_app_hosting.build.vars conditions := [ diff --git a/policies/gcp/firestore/firestore_document/project/policy.rego b/policies/gcp/firestore/firestore_document/project/policy.rego deleted file mode 100644 index 75cbb0a27..000000000 --- a/policies/gcp/firestore/firestore_document/project/policy.rego +++ /dev/null @@ -1,25 +0,0 @@ -package terraform.gcp.security.firestore_document.project - -import data.terraform.helpers -import data.terraform.gcp.security.firestore.firestore_document.vars - -conditions := [ - [ - { - "situation_description": "Firestore documents must reside in project 'c' to comply with organizational project governance.", - "remedies": [ - "Set `project = 'c'` in the google_firestore_document resource block." - ] - }, - { - "condition": "Checks if project is c", - "attribute_path": ["project"], - "values": ["c"], - "policy_type": "whitelist" - } - ] -] -summary := helpers.get_multi_summary(conditions, vars.variables) - -message := helpers.get_multi_summary(conditions, vars.variables).message -details := helpers.get_multi_summary(conditions, vars.variables).details \ No newline at end of file diff --git a/policies/gcp/gemini/google_gemini_code_repository_index/disable_force_destroy/policy.rego b/policies/gcp/gemini/google_gemini_code_repository_index/disable_force_destroy/policy.rego index b4f601c56..2b7e32016 100644 --- a/policies/gcp/gemini/google_gemini_code_repository_index/disable_force_destroy/policy.rego +++ b/policies/gcp/gemini/google_gemini_code_repository_index/disable_force_destroy/policy.rego @@ -1,5 +1,5 @@ package terraform.gcp.security.gemini.google_gemini_code_repository_index.disable_force_destroy -import data.terraform.gcp.helpers +import data.terraform.helpers import data.terraform.gcp.security.gemini.google_gemini_code_repository_index.vars conditions := [ [ diff --git a/policies/gcp/gemini/google_gemini_code_repository_index/location/policy.rego b/policies/gcp/gemini/google_gemini_code_repository_index/location/policy.rego index 3b8f165f0..2eddbf1c5 100644 --- a/policies/gcp/gemini/google_gemini_code_repository_index/location/policy.rego +++ b/policies/gcp/gemini/google_gemini_code_repository_index/location/policy.rego @@ -1,6 +1,5 @@ package terraform.gcp.security.gemini.google_gemini_code_repository_index.location - -import data.terraform.gcp.helpers +import data.terraform.helpers import data.terraform.gcp.security.gemini.google_gemini_code_repository_index.vars conditions := [ diff --git a/policies/gcp/gemini/google_gemini_code_repository_index/use_org_kms_key/policy.rego b/policies/gcp/gemini/google_gemini_code_repository_index/use_org_kms_key/policy.rego index 005f1b725..86ab17544 100644 --- a/policies/gcp/gemini/google_gemini_code_repository_index/use_org_kms_key/policy.rego +++ b/policies/gcp/gemini/google_gemini_code_repository_index/use_org_kms_key/policy.rego @@ -1,6 +1,5 @@ package terraform.gcp.security.gemini.google_gemini_code_repository_index.use_org_kms_key - -import data.terraform.gcp.helpers +import data.terraform.helpers import data.terraform.gcp.security.gemini.google_gemini_code_repository_index.vars conditions := [ diff --git a/policies/gcp/gemini/google_gemini_data_sharing_with_google_setting/disable_data_sharing_ga/policy.rego b/policies/gcp/gemini/google_gemini_data_sharing_with_google_setting/disable_data_sharing_ga/policy.rego index 6224273df..c9974a11f 100644 --- a/policies/gcp/gemini/google_gemini_data_sharing_with_google_setting/disable_data_sharing_ga/policy.rego +++ b/policies/gcp/gemini/google_gemini_data_sharing_with_google_setting/disable_data_sharing_ga/policy.rego @@ -1,6 +1,6 @@ -package terraform.gcp.security.gemini.google_gemini_data_sharing_with_google_setting.disable_preview_data_sharing +package terraform.gcp.security.gemini.google_gemini_data_sharing_with_google_setting.disable_data_sharing_ga -import data.terraform.gcp.helpers +import data.terraform.helpers import data.terraform.gcp.security.gemini.google_gemini_data_sharing_with_google_setting.vars conditions := [ diff --git a/policies/gcp/gemini/google_gemini_data_sharing_with_google_setting/disable_preview_data_sharing/policy.rego b/policies/gcp/gemini/google_gemini_data_sharing_with_google_setting/disable_preview_data_sharing/policy.rego index c6fa177ce..a7f613794 100644 --- a/policies/gcp/gemini/google_gemini_data_sharing_with_google_setting/disable_preview_data_sharing/policy.rego +++ b/policies/gcp/gemini/google_gemini_data_sharing_with_google_setting/disable_preview_data_sharing/policy.rego @@ -1,6 +1,6 @@ package terraform.gcp.security.gemini.google_gemini_data_sharing_with_google_setting.disable_preview_data_sharing -import data.terraform.gcp.helpers +import data.terraform.helpers import data.terraform.gcp.security.gemini.google_gemini_data_sharing_with_google_setting.vars conditions := [ diff --git a/policies/gcp/gemini/google_gemini_gemini_gcp_enablement_setting/disable_customer_data_sharing/policy.rego b/policies/gcp/gemini/google_gemini_gemini_gcp_enablement_setting/disable_customer_data_sharing/policy.rego index bc5918ad6..5b840fbdc 100644 --- a/policies/gcp/gemini/google_gemini_gemini_gcp_enablement_setting/disable_customer_data_sharing/policy.rego +++ b/policies/gcp/gemini/google_gemini_gemini_gcp_enablement_setting/disable_customer_data_sharing/policy.rego @@ -1,6 +1,6 @@ package terraform.gcp.security.gemini.google_gemini_gemini_gcp_enablement_setting.disable_customer_data_sharing -import data.terraform.gcp.helpers +import data.terraform.helpers import data.terraform.gcp.security.gemini.google_gemini_gemini_gcp_enablement_setting.vars conditions := [ diff --git a/policies/gcp/gemini/google_gemini_gemini_gcp_enablement_setting/force_enterprise_web_grounding/policy.rego b/policies/gcp/gemini/google_gemini_gemini_gcp_enablement_setting/force_enterprise_web_grounding/policy.rego index 4ca470263..7bb177d02 100644 --- a/policies/gcp/gemini/google_gemini_gemini_gcp_enablement_setting/force_enterprise_web_grounding/policy.rego +++ b/policies/gcp/gemini/google_gemini_gemini_gcp_enablement_setting/force_enterprise_web_grounding/policy.rego @@ -1,6 +1,6 @@ package terraform.gcp.security.gemini.google_gemini_gemini_gcp_enablement_setting.force_enterprise_web_grounding -import data.terraform.gcp.helpers +import data.terraform.helpers import data.terraform.gcp.security.gemini.google_gemini_gemini_gcp_enablement_setting.vars conditions := [ diff --git a/policies/gcp/gemini/google_gemini_logging_setting/force_log_metadata/policy.rego b/policies/gcp/gemini/google_gemini_logging_setting/force_log_metadata/policy.rego index 755c7abc6..5b53f60e8 100644 --- a/policies/gcp/gemini/google_gemini_logging_setting/force_log_metadata/policy.rego +++ b/policies/gcp/gemini/google_gemini_logging_setting/force_log_metadata/policy.rego @@ -1,6 +1,6 @@ package terraform.gcp.security.gemini.google_gemini_logging_setting.force_log_metadata -import data.terraform.gcp.helpers +import data.terraform.helpers import data.terraform.gcp.security.google_gemini_logging_setting.vars conditions := [ diff --git a/policies/gcp/gemini/google_gemini_logging_setting/force_log_prompts_responses/policy.rego b/policies/gcp/gemini/google_gemini_logging_setting/force_log_prompts_responses/policy.rego index 80f29136d..5fdc42264 100644 --- a/policies/gcp/gemini/google_gemini_logging_setting/force_log_prompts_responses/policy.rego +++ b/policies/gcp/gemini/google_gemini_logging_setting/force_log_prompts_responses/policy.rego @@ -1,6 +1,6 @@ package terraform.gcp.security.gemini.google_gemini_logging_setting.force_log_prompts_responses -import data.terraform.gcp.helpers +import data.terraform.helpers import data.terraform.gcp.security.google_gemini_logging_setting.vars conditions := [ diff --git a/policies/gcp/gemini/google_gemini_release_channel_setting/force_stable_channel/policy.rego b/policies/gcp/gemini/google_gemini_release_channel_setting/force_stable_channel/policy.rego index 482523a6b..c79f63113 100644 --- a/policies/gcp/gemini/google_gemini_release_channel_setting/force_stable_channel/policy.rego +++ b/policies/gcp/gemini/google_gemini_release_channel_setting/force_stable_channel/policy.rego @@ -1,6 +1,6 @@ package terraform.gcp.security.gemini.google_gemini_release_channel_setting.force_stable_channel -import data.terraform.gcp.helpers +import data.terraform.helpers import data.terraform.gcp.security.google_gemini_release_channel_setting.vars conditions := [ diff --git a/policies/gcp/looker/core/custom_domain_when_private/policy.rego b/policies/gcp/looker/core/custom_domain_when_private/policy.rego index ef8d8258c..0fee42570 100644 --- a/policies/gcp/looker/core/custom_domain_when_private/policy.rego +++ b/policies/gcp/looker/core/custom_domain_when_private/policy.rego @@ -19,7 +19,7 @@ conditions := [ { "condition": "Guard: public IP is OFF", "attribute_path": ["public_ip_enabled"], - "policy_type": "whitelist", + "policy_type": "blacklist", "values": [true] }, # Requirement: domain must be present → violate when missing/empty diff --git a/policies/gcp/looker/core/psc_mode_hygiene/policy.rego b/policies/gcp/looker/core/psc_mode_hygiene/policy.rego index 8c686e080..c50a90171 100644 --- a/policies/gcp/looker/core/psc_mode_hygiene/policy.rego +++ b/policies/gcp/looker/core/psc_mode_hygiene/policy.rego @@ -19,7 +19,7 @@ conditions := [ { "condition": "Guard: PSC is ON", "attribute_path": ["psc_enabled"], - "policy_type": "blacklist", + "policy_type": "whitelist", "values": [true] }, { @@ -42,7 +42,7 @@ conditions := [ { "condition": "Guard: PSC is ON", "attribute_path": ["psc_enabled"], - "policy_type": "blacklist", + "policy_type": "whitelist", "values": [true] }, { diff --git a/policies/gcp/managed_kafka/google_managed_kafka_acl/global_acls/policy.rego b/policies/gcp/managed_kafka/google_managed_kafka_acl/global_acls/policy.rego index e1c53979e..af9d0a389 100644 --- a/policies/gcp/managed_kafka/google_managed_kafka_acl/global_acls/policy.rego +++ b/policies/gcp/managed_kafka/google_managed_kafka_acl/global_acls/policy.rego @@ -17,7 +17,5 @@ conditions := [ ] -summary := { - "message": helpers.get_multi_summary(conditions, vars.variables).message, - "details": helpers.get_multi_summary(conditions, vars.variables).details -} +message := helpers.get_multi_summary(conditions, vars.variables).message +details := helpers.get_multi_summary(conditions, vars.variables).details \ No newline at end of file diff --git a/policies/gcp/managed_kafka/google_managed_kafka_acl/secured_acl_entries/policy.rego b/policies/gcp/managed_kafka/google_managed_kafka_acl/secured_acl_entries/policy.rego index 33e11e316..6be11200b 100644 --- a/policies/gcp/managed_kafka/google_managed_kafka_acl/secured_acl_entries/policy.rego +++ b/policies/gcp/managed_kafka/google_managed_kafka_acl/secured_acl_entries/policy.rego @@ -16,7 +16,6 @@ conditions := [ } ] ] -summary := { - "message": helpers.get_multi_summary(conditions, vars.variables).message, - "details": helpers.get_multi_summary(conditions, vars.variables).details -} \ No newline at end of file + +message := helpers.get_multi_summary(conditions, vars.variables).message +details := helpers.get_multi_summary(conditions, vars.variables).details \ No newline at end of file diff --git a/policies/gcp/managed_kafka/google_managed_kafka_acl/vars.rego b/policies/gcp/managed_kafka/google_managed_kafka_acl/vars.rego index 9810d94e3..505db570e 100644 --- a/policies/gcp/managed_kafka/google_managed_kafka_acl/vars.rego +++ b/policies/gcp/managed_kafka/google_managed_kafka_acl/vars.rego @@ -3,6 +3,6 @@ package terraform.gcp.security.managed_kafka.google_managed_kafka_acl.vars variables := { "friendly_resource_name": "Kafka acl", "resource_type": "google_managed_kafka_acl", - "resource_value_name" : "acl_id" + "resource_value_name" : "cluster" } \ No newline at end of file diff --git a/policies/gcp/managed_kafka/google_managed_kafka_acl/wildcard_principals/policy.rego b/policies/gcp/managed_kafka/google_managed_kafka_acl/wildcard_principals/policy.rego index 662056abc..cd75d88d1 100644 --- a/policies/gcp/managed_kafka/google_managed_kafka_acl/wildcard_principals/policy.rego +++ b/policies/gcp/managed_kafka/google_managed_kafka_acl/wildcard_principals/policy.rego @@ -18,8 +18,6 @@ conditions := [ ] ] -summary := { - "message": helpers.get_multi_summary(conditions, vars.variables).message, - "details": helpers.get_multi_summary(conditions, vars.variables).details -} +message := helpers.get_multi_summary(conditions, vars.variables).message +details := helpers.get_multi_summary(conditions, vars.variables).details diff --git a/policies/gcp/managed_kafka/google_managed_kafka_cluster/kafka_cluster/policy.rego b/policies/gcp/managed_kafka/google_managed_kafka_cluster/kafka_cluster/policy.rego index d63a1a797..2467597e6 100644 --- a/policies/gcp/managed_kafka/google_managed_kafka_cluster/kafka_cluster/policy.rego +++ b/policies/gcp/managed_kafka/google_managed_kafka_cluster/kafka_cluster/policy.rego @@ -5,15 +5,15 @@ import data.terraform.gcp.security.managed_kafka.google_managed_kafka_cluster.va conditions := [ - # Situation 1 – Whitelist subnets using pattern-based path + # Situation 1 – Blacklist empty subnets using pattern-based path [ { "situation_description": "Kafka clusters should not use public IPs; private networking must be enabled for better security.", "remedies": ["Set subnet inside network_configs to a private subnet."] }, { "condition": "network_configs.subnet must be defined", - "attribute_path": ["gcp_config", "access_config", "network_configs", 0, "subnet"], + "attribute_path": ["gcp_config", 0, "access_config", 0, "network_configs", 0, "subnet"], "values": [""], - "policy_type": "whitelist" + "policy_type": "blacklist" } ], @@ -25,8 +25,8 @@ conditions := [ }, { "condition": "vcpu_count >= 2", - "attribute_path": ["capacity_config", "vcpu_count"], - "values": [2, null], + "attribute_path": ["capacity_config", 0, "vcpu_count"], + "values": [1, 2], "policy_type": "range" } @@ -40,15 +40,13 @@ conditions := [ }, { "condition": "memory_bytes >= 2147483648", - "attribute_path": ["capacity_config", "memory_bytes"], - "values": [2147483648, null], + "attribute_path": ["capacity_config", 0, "memory_bytes"], + "values": [2147483648, 8589934592], "policy_type": "range" } ] ] -summary := { - "message": helpers.get_multi_summary(conditions, vars.variables).message, - "details": helpers.get_multi_summary(conditions, vars.variables).details -} +message := helpers.get_multi_summary(conditions, vars.variables).message +details := helpers.get_multi_summary(conditions, vars.variables).details \ No newline at end of file diff --git a/policies/gcp/managed_kafka/google_managed_kafka_cluster/kafka_cmek_enforcement/policy.rego b/policies/gcp/managed_kafka/google_managed_kafka_cluster/kafka_cmek_enforcement/policy.rego index 749060867..2c11b2e60 100644 --- a/policies/gcp/managed_kafka/google_managed_kafka_cluster/kafka_cmek_enforcement/policy.rego +++ b/policies/gcp/managed_kafka/google_managed_kafka_cluster/kafka_cmek_enforcement/policy.rego @@ -29,7 +29,7 @@ conditions := [ "condition": "location is a region that requires CMEK alignment", "attribute_path": ["location"], "values": ["us-central1", "australia-southeast1"], - "policy_type": "blacklist" + "policy_type": "whitelist" }, { "condition": "CMEK key name must follow the regional pattern for matching", @@ -48,7 +48,5 @@ conditions := [ ] ] -summary := { - "message": helpers.get_multi_summary(conditions, vars.variables).message, - "details": helpers.get_multi_summary(conditions, vars.variables).details -} +message := helpers.get_multi_summary(conditions, vars.variables).message +details := helpers.get_multi_summary(conditions, vars.variables).details \ No newline at end of file diff --git a/policies/gcp/managed_kafka/google_managed_kafka_cluster/kafka_mtls_enforcement/policy.rego b/policies/gcp/managed_kafka/google_managed_kafka_cluster/kafka_mtls_enforcement/policy.rego index 0a647d5d8..a63ff9a30 100644 --- a/policies/gcp/managed_kafka/google_managed_kafka_cluster/kafka_mtls_enforcement/policy.rego +++ b/policies/gcp/managed_kafka/google_managed_kafka_cluster/kafka_mtls_enforcement/policy.rego @@ -10,9 +10,9 @@ conditions := [ "remedies": ["Enable mTLS by configuring tls_config.trust_config.cas_configs with a valid CA pool."]}, { "condition": "tls_config.trust_config.cas_configs must be properly defined", - "attribute_path": ["tls_config", "trust_config", "cas_configs", 0, "ca_pool"], - "values": ["projects/my-project/locations/us-central1/caPools/my-ca-pool"], - "policy_type": "whitelist" + "attribute_path": ["tls_config"], + "values": [null], + "policy_type": "blacklist" } ], @@ -24,13 +24,12 @@ conditions := [ { "condition": "tls_config must be configured", "attribute_path": ["tls_config"], - "values": [""], + "values": [null], "policy_type": "blacklist" } ] ] -summary := { - "message": helpers.get_multi_summary(conditions, vars.variables).message, - "details": helpers.get_multi_summary(conditions, vars.variables).details -} + +message := helpers.get_multi_summary(conditions, vars.variables).message +details := helpers.get_multi_summary(conditions, vars.variables).details \ No newline at end of file diff --git a/policies/gcp/managed_kafka/google_managed_kafka_connect_cluster/cluster_binding/policy.rego b/policies/gcp/managed_kafka/google_managed_kafka_connect_cluster/cluster_binding/policy.rego index 7d80040d5..39eab19c7 100644 --- a/policies/gcp/managed_kafka/google_managed_kafka_connect_cluster/cluster_binding/policy.rego +++ b/policies/gcp/managed_kafka/google_managed_kafka_connect_cluster/cluster_binding/policy.rego @@ -4,51 +4,34 @@ import data.terraform.helpers import data.terraform.gcp.security.managed_kafka.google_managed_kafka_connect_cluster.vars conditions := [ - - # SCENARIO 1 — Connector must be associated with a connect cluster - [ - { - "situation_description": "Kafka Connect connectors must be linked to a valid Connect Cluster.", - "remedies": ["Set connect_cluster to a valid cluster name."] - }, - { - "condition": "connect_cluster must be defined", - "attribute_path": ["connect_cluster"], - "values": [""], - "policy_type": "blacklist" - } - ], - - # SCENARIO 2 — vCPU must be >= 2 + # SCENARIO 1 — vCPU must be >= 3 [ { "situation_description": "Connectors must have sufficient vCPU to ensure performance.", - "remedies": ["Set vCPU count to 2 or more."] + "remedies": ["Set vCPU count to 3 or more."] }, { - "condition": "vcpu_count must be >= 2", - "attribute_path": ["capacity_config", "vcpu_count"], - "values": [2, 4, 8, 16, 32, 64, 96, 128], - "policy_type": "whitelist" + "condition": "vcpu_count must be >= 3", + "attribute_path": ["capacity_config", 0, "vcpu_count"], + "values": [3, 16], + "policy_type": "range" } ], - # SCENARIO 3 — Memory must be >= 2GB + # SCENARIO 2 — Memory must be >= 3GB [ { "situation_description": "Connectors must have sufficient memory to ensure stability.", - "remedies": ["Set memory_bytes to 2GB or more."] + "remedies": ["Set memory_bytes to 3GB or more."] }, { - "condition": "memory_bytes must be >= 2GB", - "attribute_path": ["capacity_config", "memory_bytes"], - "values": [2147483648, 4294967296, 8589934592, 17179869184], - "policy_type": "whitelist" + "condition": "memory_bytes must be >= 3GB", + "attribute_path": ["capacity_config", 0, "memory_bytes"], + "values": [3221225472, 17179869184], + "policy_type": "range" } ] ] -summary := { - "message": helpers.get_multi_summary(conditions, vars.variables).message, - "details": helpers.get_multi_summary(conditions, vars.variables).details -} +message := helpers.get_multi_summary(conditions, vars.variables).message +details := helpers.get_multi_summary(conditions, vars.variables).details \ No newline at end of file diff --git a/policies/gcp/managed_kafka/google_managed_kafka_connect_cluster/disallow_public_exposure/policy.rego b/policies/gcp/managed_kafka/google_managed_kafka_connect_cluster/disallow_public_exposure/policy.rego index 50310e314..eb03ec295 100644 --- a/policies/gcp/managed_kafka/google_managed_kafka_connect_cluster/disallow_public_exposure/policy.rego +++ b/policies/gcp/managed_kafka/google_managed_kafka_connect_cluster/disallow_public_exposure/policy.rego @@ -5,24 +5,7 @@ import data.terraform.gcp.security.managed_kafka.google_managed_kafka_connect_cl conditions := [ - # SCENARIO 1 — Restrict public endpoint - [ - { - "situation_description": "Kafka Connect clusters must not allow public internet exposure.", - "remedies": [ - "Disable public_endpoint in the network configuration.", - "Use private subnets and VPC peering for secure access." - ] - }, - { - "condition": "Public endpoints must be disabled", - "attribute_path": ["network_config", "public_endpoint"], - "values": [false], - "policy_type": "whitelist" - } - ], - - # SCENARIO 2 — Enforce use of private subnets using pattern whitelist + # SCENARIO 1 — Enforce use of private subnets using pattern whitelist [ { "situation_description": "Kafka Connect clusters should only use private subnets from known project/region patterns.", @@ -32,21 +15,19 @@ conditions := [ }, { "condition": "Only private subnetworks from allowed regions/projects may be used", - "attribute_path": ["network_configs", 0, "subnet"], + "attribute_path": ["gcp_config", 0, "access_config", 0, "network_configs", 0, "primary_subnet"], "values": [ "projects/*/regions/*/subnetworks/*", [ - ["my-project", "kafka-project"], + ["c", "kafka-project"], ["us-central1", "australia-southeast1"], ["private-subnet-1", "private-subnet-2"] ] ], - "policy_type": "pattern whitelist" + "policy_type": "Pattern Whitelist" } ] ] -summary := { - "message": helpers.get_multi_summary(conditions, vars.variables).message, - "details": helpers.get_multi_summary(conditions, vars.variables).details -} +message := helpers.get_multi_summary(conditions, vars.variables).message +details := helpers.get_multi_summary(conditions, vars.variables).details \ No newline at end of file diff --git a/policies/gcp/managed_kafka/google_managed_kafka_connect_cluster/enforce_private_networking/policy.rego b/policies/gcp/managed_kafka/google_managed_kafka_connect_cluster/enforce_private_networking/policy.rego deleted file mode 100644 index 732c508b0..000000000 --- a/policies/gcp/managed_kafka/google_managed_kafka_connect_cluster/enforce_private_networking/policy.rego +++ /dev/null @@ -1,42 +0,0 @@ -package terraform.gcp.security.managed_kafka.google_managed_kafka_connect_cluster.enforce_private_networking -import data.terraform.helpers -import data.terraform.gcp.security.managed_kafka.google_managed_kafka_connect_cluster.vars - -conditions := [ - - # SCENARIO 1 — Enforce Private Networking for Kafka Connect Clusters - [ - { - "situation_description": "Kafka Connect clusters must only use private networking to avoid exposure to the public internet.", - "remedies": [ - "Set network_config.private_connectivity to true.", - "Ensure public_endpoint is disabled in the network configuration." - ] - }, - { - "condition": "Private networking must be enabled for Kafka Connect", - "attribute_path": ["network_config", "private_connectivity"], - "values": [true], - "policy_type": "whitelist" - } - ], - - # SCENARIO 2 — Restrict Public Endpoint - [ - { - "situation_description": "Public endpoints for Kafka Connect clusters must be disabled to prevent unauthorized access.", - "remedies": ["Ensure network_config.public_endpoint is set to false."] - }, - { - "condition": "Public endpoints must be disabled", - "attribute_path": ["network_config", "public_endpoint"], - "values": [false], - "policy_type": "whitelist" - } - ] -] - -summary := { - "message": helpers.get_multi_summary(conditions, vars.variables).message, - "details": helpers.get_multi_summary(conditions, vars.variables).details -} diff --git a/policies/gcp/managed_kafka/google_managed_kafka_connector/enforce_connector/policy.rego b/policies/gcp/managed_kafka/google_managed_kafka_connector/enforce_connector/policy.rego index 57c15760f..bd4cbaba1 100644 --- a/policies/gcp/managed_kafka/google_managed_kafka_connector/enforce_connector/policy.rego +++ b/policies/gcp/managed_kafka/google_managed_kafka_connector/enforce_connector/policy.rego @@ -35,7 +35,7 @@ conditions := [ { "condition": "configs must contain topics, tasks.max, and cps.project", - "attribute_path": ["configs"], + "attribute_path": ["configs", "topics"], "values": ["topics", "tasks.max", "cps.project"], "policy_type": "whitelist" } @@ -60,7 +60,7 @@ conditions := [ { "condition": "maximum_backoff must be at most 3600s", "attribute_path": ["task_restart_policy", "maximum_backoff"], - "values": ["30s", "60s", "300s", "900s", "1800s", "3600s"], + "values": ["30s", "60s", "300s", "600s", "900s", "1800s", "3600s"], "policy_type": "whitelist" } @@ -68,7 +68,5 @@ conditions := [ ] -summary := { - "message": helpers.get_multi_summary(conditions, vars.variables).message, - "details": helpers.get_multi_summary(conditions, vars.variables).details -} +message := helpers.get_multi_summary(conditions, vars.variables).message +details := helpers.get_multi_summary(conditions, vars.variables).details \ No newline at end of file diff --git a/policies/gcp/managed_kafka/google_managed_kafka_connector/task_restart/policy.rego b/policies/gcp/managed_kafka/google_managed_kafka_connector/task_restart/policy.rego index 50d387586..9602bc906 100644 --- a/policies/gcp/managed_kafka/google_managed_kafka_connector/task_restart/policy.rego +++ b/policies/gcp/managed_kafka/google_managed_kafka_connector/task_restart/policy.rego @@ -38,7 +38,5 @@ conditions := [ ] -summary := { - "message": helpers.get_multi_summary(conditions, vars.variables).message, - "details": helpers.get_multi_summary(conditions, vars.variables).details -} +message := helpers.get_multi_summary(conditions, vars.variables).message +details := helpers.get_multi_summary(conditions, vars.variables).details \ No newline at end of file diff --git a/policies/gcp/managed_kafka/google_managed_kafka_topic/secure_topic_config/policy.rego b/policies/gcp/managed_kafka/google_managed_kafka_topic/secure_topic_config/policy.rego index c6c079fad..92fd72415 100644 --- a/policies/gcp/managed_kafka/google_managed_kafka_topic/secure_topic_config/policy.rego +++ b/policies/gcp/managed_kafka/google_managed_kafka_topic/secure_topic_config/policy.rego @@ -16,8 +16,8 @@ conditions := [ { "condition": "replication_factor must be at least 3", "attribute_path": ["replication_factor"], - "values": [3, null], - "policy_type": "range" + "values": [3], + "policy_type": "whitelist" } ], @@ -79,7 +79,5 @@ conditions := [ ] ] -summary := { - "message": helpers.get_multi_summary(conditions, vars.variables).message, - "details": helpers.get_multi_summary(conditions, vars.variables).details -} +message := helpers.get_multi_summary(conditions, vars.variables).message +details := helpers.get_multi_summary(conditions, vars.variables).details \ No newline at end of file diff --git a/policies/gcp/os_config_v2/policy_orchestrator/orchestration_scope/policy.rego b/policies/gcp/os_config_v2/policy_orchestrator/orchestration_scope/policy.rego index 43f2a86ff..b092d22f8 100644 --- a/policies/gcp/os_config_v2/policy_orchestrator/orchestration_scope/policy.rego +++ b/policies/gcp/os_config_v2/policy_orchestrator/orchestration_scope/policy.rego @@ -14,7 +14,7 @@ conditions := [ }, { "condition": "Only Testing labelled environments are allowed in orchestration scope", - "attribute_path" : ["label",0,"environment"], + "attribute_path" : ["labels","environment"], "values" : ["Test","test","TEST","testing","Testing","TESTING"], "policy_type" : "whitelist" }, diff --git a/policies/gcp/os_config_v2/policy_orchestrator_for_folder/orchestration_scope/policy.rego b/policies/gcp/os_config_v2/policy_orchestrator_for_folder/orchestration_scope/policy.rego index 14913050d..a589525d2 100644 --- a/policies/gcp/os_config_v2/policy_orchestrator_for_folder/orchestration_scope/policy.rego +++ b/policies/gcp/os_config_v2/policy_orchestrator_for_folder/orchestration_scope/policy.rego @@ -14,7 +14,7 @@ conditions := [ }, { "condition": "Only Testing labelled environments are allowed in orchestration scope", - "attribute_path" : ["label",0,"environment"], + "attribute_path" : ["labels","environment"], "values" : ["Test","test","TEST","testing","Testing","TESTING"], "policy_type" : "whitelist" }, diff --git a/policies/gcp/os_config_v2/policy_orchestrator_for_organization/organization_id/policy.rego b/policies/gcp/os_config_v2/policy_orchestrator_for_organization/organization_id/policy.rego index 20ec76875..61cc422e9 100644 --- a/policies/gcp/os_config_v2/policy_orchestrator_for_organization/organization_id/policy.rego +++ b/policies/gcp/os_config_v2/policy_orchestrator_for_organization/organization_id/policy.rego @@ -6,17 +6,14 @@ conditions := [ [ {"situation_description" : "Organization ID does not follow the required pattern.", "remedies" : [" Ensure the Organization ID starts with 'Hardhat-PDE-' followed by the cloud provider and other identifiers."],}, - { - "condition": " Organization ID must start with 'Hardhat-PDE-' followed by the cloud provider and other identifiers.", - "attribute_path" : ["organization_id"], - "values" : ["Hardhat-PDE-*",[["gcp", "aws", "azure"]]], - "policy_type" : "pattern whitelist" - }, { "condition": " Organization ID must only contain lowercase letters and digits after example: 'Hardhat-PDE-aws-a1'.", "attribute_path" : ["organization_id"], - "values" : ["Hardhat-PDE-*-**",[["gcp","aws","azure"], ["a","b","c","d","e","f","g","h","i","j","k","l","m","n","o","p","q","r","s","t","u","v","w","x","y","z"], - ["0","1","2","3","4","5","6","7","8","9"]]], + "values" : [ + "Hardhat-PDE-*-**",[ + ["gcp","aws","azure"], + ["a","b","c","d","e","f","g","h","i","j","k","l","m","n","o","p","q","r","s","t","u","v","w","x","y","z"], + ["0","1","2","3","4","5","6","7","8","9"]]], "policy_type" : "pattern whitelist" }, ], diff --git a/policies/gcp/os_config_v2/policy_orchestrator_for_organization/policy_orchestrator_id/policy.rego b/policies/gcp/os_config_v2/policy_orchestrator_for_organization/policy_orchestrator_id/policy.rego index 86ac5438b..6311ea050 100644 --- a/policies/gcp/os_config_v2/policy_orchestrator_for_organization/policy_orchestrator_id/policy.rego +++ b/policies/gcp/os_config_v2/policy_orchestrator_for_organization/policy_orchestrator_id/policy.rego @@ -6,24 +6,6 @@ conditions := [ [ {"situation_description" : "Policy Orchestrator ID does not follow the required pattern.", "remedies" : ["Should follow the pattern vendor-cloud-environment-unique_id (e.g., google-gcp-production-a1)."]}, - { - "condition": "The company uses only three cloud vendors: Google, Amazon, and Microsoft.", - "attribute_path" : ["policy_orchestrator_id"], - "values" : ["*",[["google", "amazon", "microsoft"]]], - "policy_type" : "pattern whitelist" - }, - { - "condition": "Please match the cloud providers to their respective cloud platforms.", - "attribute_path" : ["policy_orchestrator_id"], - "values" : ["*-*",[["google", "amazon", "microsoft"],["gcp","aws","azure"]]], - "policy_type" : "pattern whitelist" - }, - { - "condition": "Only 'production' and 'deployment' environments are allowed for Policy Orchestrator IDs.", - "attribute_path" : ["policy_orchestrator_id"], - "values" : ["*-*-*",[["google", "amazon", "microsoft"],["gcp","aws","azure"],["production", "deployment"]]], - "policy_type" : "pattern whitelist" - }, { "condition": "The Policy Orchestrator ID must include a unique identifier.", "attribute_path" : ["policy_orchestrator_id"], diff --git a/scripts/auto_test/auto_test_v2.py b/scripts/auto_test/auto_test_v2.py new file mode 100644 index 000000000..3e43d97b8 --- /dev/null +++ b/scripts/auto_test/auto_test_v2.py @@ -0,0 +1,458 @@ +import os +import sys +import subprocess +import argparse +import json +import re +import shutil +from pathlib import Path +from concurrent.futures import ThreadPoolExecutor, as_completed +from threading import Lock + + +def normalize_policies_root(provided_root: Path) -> Path: + """ + Traverse up the directory tree to find the root containing _helpers module. + + This handles cases where users pass service-specific policy paths (e.g., + ./policies/gcp/service_name) but OPA needs access to the shared helpers + located at policies/_helpers. The function ensures OPA can always load + the terraform.helpers module and its dependencies. + + Args: + provided_root: The policies root directory provided by the user + + Returns: + The actual policies root containing _helpers directory + """ + current = Path(provided_root).resolve() + max_traversal = 5 # Safety limit to prevent infinite loops + + for _ in range(max_traversal): + if (current / "_helpers").exists(): + return current + parent = current.parent + if parent == current: # Reached filesystem root + break + current = parent + + # If helpers not found, return original path + # (will fail with OPA error showing undefined function) + return Path(provided_root).resolve() + + +def extract_path_parts(path: Path): + if len(path.parts) < 3: + sys.exit(f"Invalid path: {path}") + return path.parts[-3], path.parts[-2], path.parts[-1] # service, resource, attribute + + +def make_failure(attribute: str, reason: str, service: str, resource: str) -> dict: + return {"service": str(service), "resource": str(resource), "policy": str(attribute), "passed": False, + "failure": {"reason": reason}} + + +def make_success(attribute: str, service: str, resource: str) -> dict: + return {"service": str(service), "resource": str(resource), "policy": str(attribute), "passed": True} + + +def opa_eval_value(policies_root: Path, plan_json_path: Path, query: str): + """Evaluate an OPA query and return the expression value from JSON output or None.""" + cmd = f'opa eval --data "{policies_root}" --input "{plan_json_path}" --format json "{query}"' + result = subprocess.run(cmd, shell=True, capture_output=True, text=True) + if result.returncode != 0: + thread_safe_print(f"❌ OPA eval failed for query: {query}") + thread_safe_print(f"Command: {cmd}") + if result.stdout: + thread_safe_print(f"STDOUT: {result.stdout[:500]}") + if result.stderr: + thread_safe_print(f"STDERR: {result.stderr[:500]}") + return None + try: + payload = json.loads(result.stdout) + res = payload.get("result") + if not res: + thread_safe_print(f"OPA query returned empty result for: {query}") + return None + # Take first expression value + exprs = res[0].get("expressions") if isinstance(res, list) and res else None + if not exprs: + thread_safe_print(f"OPA query returned no expressions for: {query}") + return None + return exprs[0].get("value") + except Exception as e: + thread_safe_print(f"❌ Failed to parse OPA JSON output: {e}") + thread_safe_print(f"Query: {query}") + thread_safe_print(f"Output: {result.stdout[:500]}") + return None + + +def get_unique_resource_names(plan_json_path: Path, resource_type: str) -> set[str]: + """Return unique Terraform resource names for a given type, + considering only root_module resources. + """ + try: + data = json.loads(plan_json_path.read_text(encoding="utf-8")) + except Exception as e: + print(f"Failed to read/parse JSON: {plan_json_path}: {e}") + return set() + + names: set[str] = set() + + root = data.get("planned_values", {}).get("root_module", {}) + for res in root.get("resources", []): + if res.get("type") == resource_type: + name = res.get("name") + if isinstance(name, str): + names.add(name) + + return names + + +def get_all_resource_types(plan_json_path: Path) -> list[str]: + """Return all unique resource types found in the plan.json file.""" + try: + data = json.loads(plan_json_path.read_text(encoding="utf-8")) + except Exception as e: + return [] + + resource_types = set() + root = data.get("planned_values", {}).get("root_module", {}) + for res in root.get("resources", []): + res_type = res.get("type") + if res_type: + resource_types.add(res_type) + + return sorted(resource_types) + + +def parse_rego_metadata(policy_dir: Path): + """Parse policy.rego to extract (package_path, vars_import_data_path). + Returns a tuple (pkg_path, vars_import) or (None, None). + """ + policy_file = policy_dir / "policy.rego" + if not policy_file.exists(): + return None, None + pkg = None + vars_import = None + try: + for line in policy_file.read_text(encoding="utf-8").splitlines(): + if pkg is None: + m = re.match(r"^\s*package\s+([^\s]+)\s*$", line) + if m: + pkg = m.group(1).strip() + continue + if vars_import is None: + m2 = re.match(r"^\s*import\s+(data\.[\w\.]*?\.vars)\b", line) + if m2: + vars_import = m2.group(1).strip() + if pkg and vars_import: + break + except Exception: + return None, None + return pkg, vars_import + + +def match_names_in_messages(messages: list[str], candidate_names: set[str]) -> set[str]: + """Match candidate names within messages using safe boundaries to avoid short-name false positives.""" + matched: set[str] = set() + if not messages or not candidate_names: + return matched + patterns = { + name: re.compile(rf"(? list[str]: + if isinstance(messages_value, list): + return [str(m) for m in messages_value] + if isinstance(messages_value, str): + return [messages_value] + if messages_value is not None: + return [str(messages_value)] + return [] + + +def get_policy_messages(policies_root: Path, plan_path: Path, message_query: str) -> list[str]: + val = opa_eval_value(policies_root.resolve(), plan_path, message_query) + return normalize_messages(val) + + +def run_terraform_commands(input_dir: Path, verbose: bool = False) -> Path | None: + env = os.environ.copy() + + creds_path = input_dir / "fake-creds.json" + creds_content = '{"type": "service_account", "project_id": "fake-project"}' + creds_path.write_text(creds_content) + + plugin_cache = Path.home() / ".terraform.d" / "plugin-cache" + global_data_dir = Path(".tfshared").resolve() + global_data_dir.mkdir(parents=True, exist_ok=True) + + env.update({ + 'GOOGLE_APPLICATION_CREDENTIALS': str(creds_path), + 'GOOGLE_PROJECT': 'fake-project', + 'GOOGLE_REGION': 'us-central1', + 'TF_PLUGIN_CACHE_DIR': str(plugin_cache), + 'TF_DATA_DIR': str(global_data_dir), + }) + + commands = [ + ("terraform init -backend=false"), + ("terraform plan -refresh=false -lock=false -input=false -out=plan"), + ("terraform show -json plan | cat > plan.json") + ] + + for cmd in commands: + result = subprocess.run( + cmd, + shell=True, + cwd=input_dir, + capture_output=True, + text=True, + env=env + ) + if result.returncode != 0: + if verbose: + print(f"❌ Command failed: {cmd}") + print("--- stdout ---") + print(result.stdout) + print("--- stderr ---") + print(result.stderr) + return None + + plan_json = input_dir / "plan.json" + return plan_json + + +def get_policy_metadata(policy_dir: Path, service: str, resource: str, attribute: str) -> tuple[str, str]: + """Return (message_query, vars_resource_type_query).""" + pkg_path, vars_import = parse_rego_metadata(policy_dir) + if not pkg_path: + pkg_path = f"terraform.gcp.security.{service}.{resource}.{attribute}" + message_query = f"data.{pkg_path}.message" + if vars_import: + vars_resource_type_query = f"{vars_import}.variables.resource_type" + else: + vars_resource_type_query = f"data.terraform.gcp.security.{service}.{resource}.vars.variables.resource_type" + return message_query, vars_resource_type_query + + +# Add a lock for thread-safe printing +print_lock = Lock() + +def thread_safe_print(*args, **kwargs): + """Thread-safe print function.""" + with print_lock: + print(*args, **kwargs) + + +def validate_policy_output(attribute: str, resource_type: str | None, plan_path: Path, messages: list[str], + verbose: bool, service: str, resource: str) -> dict: + unique_names = get_unique_resource_names(plan_path, str(resource_type)) + matched = match_names_in_messages(messages, unique_names) + + # Fail if any name other than 'nc*' appears + nc_pattern = re.compile(r"^nc\d*$", re.IGNORECASE) + non_nc_in_output = {n.strip() for n in matched if not nc_pattern.fullmatch(n)} + if non_nc_in_output: + thread_safe_print(f"Check failed: Resources in output other than 'nc' found: {', '.join(sorted(non_nc_in_output))}\n") + return make_failure(attribute, + f"Resources in output other than 'nc' found: {', '.join(sorted(non_nc_in_output))}", + service, resource) + + # Ensure all resources are mentioned, except 'c*' which can be omitted + missing = unique_names - matched + ignore_pattern = re.compile(r"^c\d*$", re.IGNORECASE) + missing_non_c = {n.strip() for n in missing if not ignore_pattern.fullmatch(n)} + + if verbose: + rt = resource_type if resource_type else "any" + thread_safe_print(f"Unique resource names in plan ({rt}): {len(unique_names)}") + thread_safe_print(f"Names mentioned in output: {len(matched)}") + if missing: + thread_safe_print(f" Missing mentions: {', '.join(sorted(missing))}") + + if missing_non_c: + if verbose: + thread_safe_print(f"Check failed: Unmentioned resources other than 'c' found: {', '.join(sorted(missing_non_c))}\n") + return make_failure(attribute, + f"Unmentioned resources other than 'c' found: {', '.join(sorted(missing_non_c))}", service, + resource) + + if missing and missing == {"c"} and verbose: + thread_safe_print("Only compliant resources are unmentioned; ignoring") + if verbose: + thread_safe_print("Check passed\n") + return make_success(attribute, service, resource) + + +def run_policy_check_pair(input_dir: Path, policy_dir: Path, policies_root: Path, verbose: bool = False): + # Extract data about services and filesystem paths + abs_input_dir = input_dir.resolve() + service, resource, attribute = extract_path_parts(input_dir) + # Runs TF commands and returns abs path to plan.json + plan_path = run_terraform_commands(abs_input_dir, verbose) + cleanup_workspace(abs_input_dir) + + if plan_path is None: + res = make_failure(attribute, "Terraform failed to compile!", service, resource) + return res + + message_query, vars_resource_type_query = get_policy_metadata(policy_dir, service, resource, attribute) + + resource_type = get_resource_type(policies_root, plan_path, vars_resource_type_query) + if resource_type is None: + # Get diagnostic info + actual_types = get_all_resource_types(plan_path) + diagnostics = [ + f"Query used: {vars_resource_type_query}", + f"Resource types found in plan: {', '.join(actual_types) if actual_types else 'NONE'}", + f"Plan file: {plan_path}" + ] + error_msg = "Could not find resource_type variable! " + " | ".join(diagnostics) + res = make_failure(attribute, error_msg, service, resource) + return res + + messages = get_policy_messages(policies_root, plan_path, message_query) + if not messages: + res = make_failure(attribute, "Could not run OPA query!", service, resource) + return res + + if verbose: + thread_safe_print(f"OPA check: {message_query}") + for m in messages: + thread_safe_print(m) + + res = validate_policy_output(attribute, resource_type, plan_path, messages, verbose, service, resource) + return res + +def cleanup_workspace(workdir: Path): + # remove plan binary and other transient parts + for fname in ["plan", "fake-creds.json"]: + f = workdir / fname + try: + f.unlink() + except FileNotFoundError: + pass + + # remove .terraform directory recursively + for tfdir in workdir.rglob(".terraform"): + if tfdir.is_dir(): + try: + shutil.rmtree(tfdir) + except Exception as e: + pass + +def find_matching_pairs(inputs_root: Path, policies_base_root: Path, policies_search_root: Path): + """ + Find matching input/policy directory pairs. + + Args: + inputs_root: Root directory for Terraform input files + policies_base_root: The actual root containing _helpers (for OPA evaluation) + policies_search_root: The user-provided policies root (for path matching) + """ + def is_leaf_terraform_dir(directory: Path) -> bool: + # Must have .tf in this directory + if not any(f.suffix == ".tf" for f in directory.glob("*.tf")): + return False + # And no descendant directory with .tf files + for tf in directory.rglob("*.tf"): + if tf.parent != directory: + return False + return True + + input_dirs = [p for p in inputs_root.rglob('*') if p.is_dir() and is_leaf_terraform_dir(p)] + pairs = [] + + for input_dir in input_dirs: + relative = input_dir.relative_to(inputs_root) + policy_dir = policies_search_root / relative + if policy_dir.is_dir(): + pairs.append((input_dir, policy_dir)) + else: + print(f" No matching policy dir for: {input_dir}") + return pairs + + +def main(): + parser = argparse.ArgumentParser( + description="Run Terraform + OPA policy checks for all matched input/policy pairs.") + parser.add_argument("--inputs", default="inputs/gcp", help="Root directory for Terraform inputs") + parser.add_argument("--policies", default="policies/gcp", help="Root directory for policy files") + parser.add_argument("--verbose", action="store_true", help="Enable verbose output") + parser.add_argument("--workers", type=int, default=4, help="Number of parallel workers (default: 4)") + args = parser.parse_args() + + inputs_root = Path(args.inputs) + policies_search_root = Path(args.policies) + policies_base_root = normalize_policies_root(policies_search_root) + + pairs = find_matching_pairs(inputs_root, policies_base_root, policies_search_root) + if not pairs: + print(" No matching input/policy pairs found.") + sys.exit(1) + + results = [] + failure_flag = False + + # Process pairs in parallel + with ThreadPoolExecutor(max_workers=args.workers) as executor: + # Submit all tasks + future_to_pair = { + executor.submit(run_policy_check_pair, input_dir, policy_dir, policies_base_root, args.verbose): (input_dir, policy_dir) + for input_dir, policy_dir in pairs + } + + # Collect results as they complete + for future in as_completed(future_to_pair): + input_dir, policy_dir = future_to_pair[future] + try: + result = future.result() + results.append(result) + except Exception as exc: + thread_safe_print(f"Error processing {input_dir}: {exc}") + service, resource, attribute = extract_path_parts(input_dir) + results.append(make_failure(attribute, f"Exception: {exc}", service, resource)) + + # Grouped summary by service -> resource + grouped: dict[str, dict[str, list[dict]]] = {} + for r in results: + grouped.setdefault(r.get("service", "unknown"), {}).setdefault(r.get("resource", "unknown"), []).append(r) + + print("\nSummary of policy checks:") + for service in sorted(grouped): + print(f"Service: {service}") + for resource in sorted(grouped[service]): + print(f" Resource: {resource}") + for res in grouped[service][resource]: + status = "✅" if res["passed"] else "❌" + if not res["passed"]: + failure_flag = True + print(f" Policy: {res['policy']} - {status}") + print() + + if failure_flag: + print("\nFailures:") + for service in sorted(grouped): + for resource in sorted(grouped[service]): + for res in grouped[service][resource]: + if not res["passed"]: + print(f"Service: {service} | Resource: {resource} | Policy: {res['policy']}") + print(f"{res['failure']['reason']}") + print() + sys.exit(1) + + +if __name__ == "__main__": + main() \ No newline at end of file