Dataset Viewer
Auto-converted to Parquet Duplicate
input
listlengths
2
2
ideal
stringclasses
4 values
[ { "role": "system", "content": "Choose the best Terraform patch (A/B/C/D) that implements the requested GCP Compute Engine change safely. Only respond with a single uppercase letter." }, { "role": "user", "content": "Task Description:\nThis PR contains the following updates:\n\n| Package | Change | Age | Confidence |\n|---|---|---|---|\n| [github.com/stretchr/testify](https://redirect.github.com/stretchr/testify) | `v1.11.0` -> `v1.11.1` | [![age](https://developer.mend.io/api/mc/badges/age/go/github.com%2fstretchr%2ftestify/v1.11.1?slim=true)](https://docs.renovatebot.com/merge-confidence/) | [![confidence](https://developer.mend.io/api/mc/badges/confidence/go/github.com%2fstretchr%2ftestify/v1.11.0/v1.11.1?slim=true)](https://docs.renovatebot.com/merge-confidence/) |\n\n---\n\n### Release Notes\n\n<details>\n<summary>stretchr/testify (github.com/stretchr/testify)</summary>\n\n### [`v1.11.1`](https://redirect.github.com/stretchr/testify/releases/tag/v1.11.1)\n\n[Compare Source](https://redirect.github.com/stretchr/testify/compare/v1.11.0...v1.11.1)\n\nThis release fixes [#&#8203;1785](https://redirect.github.com/stretchr/testify/issues/1785) introduced in v1.11.0 where expected argument values implementing the stringer interface (`String() string`) with a method which mutates their value, when passed to mock.Mock.On (`m.On(\"Method\", <expected>).Return()`) or actual argument values passed to mock.Mock.Called may no longer match one another where they previously did match. The behaviour prior to v1.11.0 where the stringer is always called is restored. Future testify releases may not call the stringer method at all in this case.\n\n#### What's Changed\n\n- Backport [#&#8203;1786](https://redirect.github.com/stretchr/testify/issues/1786) to release/1.11: mock: revert to pre-v1.11.0 argument matching behavior for mutating stringers by [@&#8203;brackendawson](https://redirect.github.com/brackendawson) in [#&#8203;1788](https://redirect.github.com/stretchr/testify/pull/1788)\n\n**Full Changelog**: <https://github.com/stretchr/testify/compare/v1.11.0...v1.11.1>\n\n</details>\n\n---\n\n### Configuration\n\n๐Ÿ“… **Schedule**: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).\n\n๐Ÿšฆ **Automerge**: Disabled by config. Please merge this manually once you are satisfied.\n\nโ™ป **Rebasing**: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.\n\n๐Ÿ”• **Ignore**: Close this PR and you won't be reminded about this update again.\n\n---\n\n - [ ] <!-- rebase-check -->If you want to rebase/retry this PR, check this box\n\n---\n\nThis PR was generated by [Mend Renovate](https://mend.io/renovate/). View the [repository job log](https://developer.mend.io/github/terraform-google-modules/terraform-google-kubernetes-engine).\n<!--renovate-debug:eyJjcmVhdGVkSW5WZXIiOiI0MS45MS4xIiwidXBkYXRlZEluVmVyIjoiNDEuOTEuMSIsInRhcmdldEJyYW5jaCI6Im1haW4iLCJsYWJlbHMiOlsiZGVwZW5kZW5jaWVzIl19-->\n\n\n---\n\nChoice A:\ntest/integration/go.mod\n@@ -8,7 +8,7 @@ require (\n \tgithub.com/GoogleCloudPlatform/cloud-foundation-toolkit/infra/blueprint-test v0.17.8\n \tgithub.com/gruntwork-io/terratest v0.50.0\n \tgithub.com/hashicorp/terraform-json v0.26.0\n-\tgithub.com/stretchr/testify v1.11.0\n+\tgithub.com/stretchr/testify v1.11.1\n \tgithub.com/tidwall/gjson v1.18.0\n )\n \n---\ntest/integration/go.sum\n@@ -237,8 v1.11.0/go.mod @@ github.com/stretchr/testify v1.7.0/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/\n github.com/stretchr/testify v1.7.1/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/h/Wwjteg=\n github.com/stretchr/testify v1.8.0/go.mod h1:yNjHg4UonilssWZ8iaSj1OCr/vHnekPRkoO+kdMU+MU=\n github.com/stretchr/testify v1.8.1/go.mod h1:w2LPCIKwWwSfY2zedu0+kehJoqGctiVI29o6fzry7u4=\n-github.com/stretchr/testify v1.11.0 h1:ib4sjIrwZKxE5u/Japgo/7SJV3PvgjGiRNAvTVGqQl8=\n-github.com/stretchr/testify v1.11.0/go.mod h1:wZwfW3scLgRK+23gO65QZefKpKQRnfz6sD981Nm4B6U=\n+github.com/stretchr/testify v1.11.1 h1:7s2iGBzp5EwR7/aIZr8ao5+dra3wiQyKjjFuvgVKu7U=\n+github.com/stretchr/testify v1.11.1/go.mod h1:wZwfW3scLgRK+23gO65QZefKpKQRnfz6sD981Nm4B6U=\n github.com/tidwall/gjson v1.14.2/go.mod h1:/wbyibRr2FHMks5tjHJ5F8dMZh3AcwJEMf5vlfC0lxk=\n github.com/tidwall/gjson v1.18.0 h1:FIDeeyB800efLX89e5a8Y0BNH+LOngJyGrIWxG2FKQY=\n github.com/tidwall/gjson v1.18.0/go.mod h1:/wbyibRr2FHMks5tjHJ5F8dMZh3AcwJEMf5vlfC0lxk=\n---\n\n\n---\n\nChoice B:\ntest/integration/go.mod\n@@ -8,7 +8,7 @@ require (\n \tgithub.com/GoogleCloudPlatform/cloud-foundation-toolkit/infra/blueprint-test v0.17.8\n \tgithub.com/gruntwork-io/terratest v0.50.0\n \tgithub.com/hashicorp/terraform-json v0.26.0\n-\tgithub.com/stretchr/testify v1.11.0\n+\tgithub.com/stretchr/testify v1.11.1\n \tgithub.com/tidwall/gjson v1.18.0\n )\n \n---\ntest/integration/go.sum\n@@ -237,8 +237,8 @@ github.com/stretchr/testify v1.7.0/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/\n github.com/stretchr/testify v1.7.1/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/h/Wwjteg=\n github.com/stretchr/testify v1.8.0/go.mod h1:yNjHg4UonilssWZ8iaSj1OCr/vHnekPRkoO+kdMU+MU=\n github.com/stretchr/testify v1.8.1/go.mod h1:w2LPCIKwWwSfY2zedu0+kehJoqGctiVI29o6fzry7u4=\n-github.com/stretchr/testify v1.11.0 h1:ib4sjIrwZKxE5u/Japgo/7SJV3PvgjGiRNAvTVGqQl8=\n-github.com/stretchr/testify v1.11.0/go.mod h1:wZwfW3scLgRK+23gO65QZefKpKQRnfz6sD981Nm4B6U=\n+github.com/stretchr/testify v1.11.1 h1:7s2iGBzp5EwR7/aIZr8ao5+dra3wiQyKjjFuvgVKu7U=\n+github.com/stretchr/testify v1.11.1/go.mod h1:wZwfW3scLgRK+23gO65QZefKpKQRnfz6sD981Nm4B6U=\n github.com/tidwall/gjson v1.14.2/go.mod h1:/wbyibRr2FHMks5tjHJ5F8dMZh3AcwJEMf5vlfC0lxk=\n github.com/tidwall/gjson v1.18.0 h1:FIDeeyB800efLX89e5a8Y0BNH+LOngJyGrIWxG2FKQY=\n github.com/tidwall/gjson v1.18.0/go.mod h1:/wbyibRr2FHMks5tjHJ5F8dMZh3AcwJEMf5vlfC0lxk=\n---\n\n\n---\n\nChoice C:\ntest/integration/go.mod\n@@ -8,7 +8,7 @@ require (\n \tgithub.com/GoogleCloudPlatform/cloud-foundation-toolkit/infra/blueprint-test v0.17.8\n \tgithub.com/gruntwork-io/terratest v0.50.0\n \tgithub.com/hashicorp/terraform-json v0.26.0\n-\tgithub.com/stretchr/testify v1.11.0\n+\tgithub.com/stretchr/testify v1.11.1\n \tgithub.com/tidwall/gjson v1.18.0\n )\n \n---\ntest/integration/go.sum\n@@ -237,8 v1.11.1\n @@ github.com/stretchr/testify v1.7.0/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/\n github.com/stretchr/testify v1.7.1/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/h/Wwjteg=\n github.com/stretchr/testify v1.8.0/go.mod h1:yNjHg4UonilssWZ8iaSj1OCr/vHnekPRkoO+kdMU+MU=\n github.com/stretchr/testify v1.8.1/go.mod h1:w2LPCIKwWwSfY2zedu0+kehJoqGctiVI29o6fzry7u4=\n-github.com/stretchr/testify v1.11.0 h1:ib4sjIrwZKxE5u/Japgo/7SJV3PvgjGiRNAvTVGqQl8=\n-github.com/stretchr/testify v1.11.0/go.mod h1:wZwfW3scLgRK+23gO65QZefKpKQRnfz6sD981Nm4B6U=\n+github.com/stretchr/testify v1.11.1 h1:7s2iGBzp5EwR7/aIZr8ao5+dra3wiQyKjjFuvgVKu7U=\n+github.com/stretchr/testify v1.11.1/go.mod h1:wZwfW3scLgRK+23gO65QZefKpKQRnfz6sD981Nm4B6U=\n github.com/tidwall/gjson v1.14.2/go.mod h1:/wbyibRr2FHMks5tjHJ5F8dMZh3AcwJEMf5vlfC0lxk=\n github.com/tidwall/gjson v1.18.0 h1:FIDeeyB800efLX89e5a8Y0BNH+LOngJyGrIWxG2FKQY=\n github.com/tidwall/gjson v1.18.0/go.mod h1:/wbyibRr2FHMks5tjHJ5F8dMZh3AcwJEMf5vlfC0lxk=\n---\n\n\n---\n\nChoice D:\ntest/integration/go.mod\n@@ -8,7 +8,7 @@ require (\n \tgithub.com/GoogleCloudPlatform/cloud-foundation-toolkit/infra/blueprint-test v0.17.8\n \tgithub.com/gruntwork-io/terratest v0.50.0\n \tgithub.com/hashicorp/terraform-json v0.26.0\n-\tgithub.com/stretchr/testify v1.11.0\n+\tgithub.com/stretchr/testify v1.11.1\n \tgithub.com/tidwall/gjson v1.18.0\n )\n \n---\ntest/integration/go.sum\n@@ -237,8 +237,8 @@ github.com/stretchr/testify v1.7.0/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/\n github.com/stretchr/testify v1.7.1/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/h/Wwjteg=\n github.com/stretchr/testify v1.8.0/go.mod h1:yNjHg4UonilssWZ8iaSj1OCr/vHnekPRkoO+kdMU+MU=\n github.com/stretchr/testify v1.8.1/go.mod h1:w2LPCIKwWwSfY2zedu0+kehJoqGctiVI29o6fzry7u4=\n-github.com/stretchr/testify v1.11.0 h1:ib4sjIrwZKxE5u/Japgo/7SJV3PvgjGiRNAvTVGqQl8=\n-github.com/stretchr/testify v1.11.0/go.mod h1:wZwfW3scLgRK+23gO65QZefKpKQRnfz6sD981Nm4B6U=\n+github.com/stretchr/testify v1.11.1 h1:7s2iGBzp5EwR7/aIZr8ao5+dra3wiQyKjjFuvgVKu7U=\n+github.com/stretchr/testify v1.11.1/go.mod h1:wZwfW3scLgRK+23gO65QZefKpKQRnfz6sD981Nm4B6U=\n github.com/tidwall/gjson v1.14.2/go.mod h1:/wbyibRr2FHMks5tjHJ5F8dMZh3AcwJEMf5vlfC0lxk=\n github.com/tidwall/gjson \tgithub.com/GoogleCloudPlatform/cloud-foundation-toolkit/infra/blueprint-test h1:FIDeeyB800efLX89e5a8Y0BNH+LOngJyGrIWxG2FKQY=\n github.com/tidwall/gjson v1.18.0/go.mod h1:/wbyibRr2FHMks5tjHJ5F8dMZh3AcwJEMf5vlfC0lxk=\n---\n\n\n---\n" } ]
B
[ { "role": "system", "content": "Choose the best Terraform patch (A/B/C/D) that implements the requested GCP Compute Engine change safely. Only respond with a single uppercase letter." }, { "role": "user", "content": "Task Description:\nUnblocked by https://github.com/GoogleCloudPlatform/cloud-foundation-toolkit/pull/3164\n\n---\n\nChoice A:\nMakefile\n@@ -76,14 +76,13 @@ docker_test_lint:\n \t\t/usr/local/bin/test_lint.sh\n \n # Generate documentation\n-# Removed `display` for https://github.com/GoogleCloudPlatform/cloud-foundation-toolkit/issues/3140\n .PHONY: docker_generate_docs\n docker_generate_docs:\n \t$(DOCKER_BIN) run --rm -it \\\n \t\t-e ENABLE_BPMETADATA=1 \\\n \t\t-v \"$(CURDIR)\":/workspace \\\n \t\t$(REGISTRY_URL)/${DOCKER_IMAGE_DEVELOPER_TOOLS}:${DOCKER_TAG_VERSION_DEVELOPER_TOOLS} \\\n-\t\t/bin/bash -c 'source /usr/local/bin/task_helper_functions.sh && generate_docs --per-module-requirements'\n+\t\t/bin/bash -c 'source /usr/local/bin/task_helper_functions.sh && generate_docs -d --per-module-requirements'\n \n # Generate files from autogen\n .PHONY: docker_generate_modules\n---\nmodules/gke-node-pool/metadata.yaml\n@@ -403,9 +403,9 @@ spec:\n roles:\n - level: Project\n roles:\n+ - roles/compute.admin\n - roles/container.admin\n - roles/iam.serviceAccountUser\n- - roles/compute.admin\n services:\n - compute.googleapis.com\n - container.googleapis.com\n---\nmodules/gke-standard-cluster/metadata.yaml\n@@ -1008,9 +1008,9 @@ spec:\n roles:\n - level: Project\n roles:\n+ - roles/iam.serviceAccountUser\n - roles/compute.admin\n - roles/container.admin\n- - roles/iam.serviceAccountUser\n services:\n - compute.googleapis.com\n - container.googleapis.com\n---\n\n\n---\n\nChoice B:\nMakefile\n@@ -76,14 +76,13 @@ docker_test_lint:\n \t\t/usr/local/bin/test_lint.sh\n \n # Generate documentation\n-# Removed `display` for https://github.com/GoogleCloudPlatform/cloud-foundation-toolkit/issues/3140\n .PHONY: docker_generate_docs\n docker_generate_docs:\n \t$(DOCKER_BIN) run --rm -it \\\n \t\t-e ENABLE_BPMETADATA=1 \\\n \t\t-v \"$(CURDIR)\":/workspace \\\n \t\t$(REGISTRY_URL)/${DOCKER_IMAGE_DEVELOPER_TOOLS}:${DOCKER_TAG_VERSION_DEVELOPER_TOOLS} \\\n-\t\t/bin/bash -c 'source /usr/local/bin/task_helper_functions.sh && generate_docs --per-module-requirements'\n+\t\t/bin/bash -c 'source /usr/local/bin/task_helper_functions.sh && generate_docs -d --per-module-requirements'\n \n # Generate files from autogen\n .PHONY: docker_generate_modules\n---\nmodules/gke-node-pool/metadata.yaml\n@@ -403,9 +403,9 @@ spec:\n roles:\n - level: Project\n roles:\n+ - roles/compute.admin\n - roles/container.admin\n - roles/iam.serviceAccountUser\n- - roles/compute.admin\n services:\n - compute.googleapis.com\n - container.googleapis.com\n---\nmodules/gke-standard-cluster/metadata.yaml\n@@ -1008,9 +1008,9 @@ spec:\n roles:\n - level: Project\n roles:\n+ - roles/iam.serviceAccountUser\n - roles/compute.admin\n - roles/container.admin\n- - roles/iam.serviceAccountUser\n services:\n - -c - container.googleapis.com\n---\n\n\n---\n\nChoice C:\nMakefile\n@@ -76,14 +76,13 @@ docker_test_lint:\n \t\t/usr/local/bin/test_lint.sh\n \n # Generate documentation\n-# Removed `display` for https://github.com/GoogleCloudPlatform/cloud-foundation-toolkit/issues/3140\n .PHONY: docker_generate_docs\n docker_generate_docs:\n \t$(DOCKER_BIN) run --rm -it \\\n \t\t-e ENABLE_BPMETADATA=1 \\\n \t\t-v \"$(CURDIR)\":/workspace \\\n \t\t$(REGISTRY_URL)/${DOCKER_IMAGE_DEVELOPER_TOOLS}:${DOCKER_TAG_VERSION_DEVELOPER_TOOLS} \\\n-\t\t/bin/bash -c 'source /usr/local/bin/task_helper_functions.sh && generate_docs --per-module-requirements'\n+\t\t/bin/bash -c 'source /usr/local/bin/task_helper_functions.sh && generate_docs -d --per-module-requirements'\n \n # Generate files from autogen\n .PHONY: docker_generate_modules\n---\nmodules/gke-node-pool/metadata.yaml\n@@ -403,9 +403,9 @@ spec:\n roles:\n - level: Project\n roles:\n+ - roles/compute.admin\n - roles/container.admin\n - roles/iam.serviceAccountUser\n- - roles/compute.admin\n services:\n - compute.googleapis.com\n - container.googleapis.com\n---\nmodules/gke-standard-cluster/metadata.yaml\n@@ -1008,9 +1008,9 @@ spec:\n roles:\n - level: Project\n roles:\n+ - roles/iam.serviceAccountUser\n - roles/compute.admin\n - roles/container.admin\n- - roles/iam.serviceAccountUser\n services:\n - compute.googleapis.com\n - container.googleapis.com\n---\n\n\n---\n\nChoice D:\nMakefile\n@@ -76,14 +76,13 @@ docker_test_lint:\n \t\t/usr/local/bin/test_lint.sh\n \n # Generate documentation\n-# Removed `display` for https://github.com/GoogleCloudPlatform/cloud-foundation-toolkit/issues/3140\n .PHONY: docker_generate_docs\n docker_generate_docs:\n \t$(DOCKER_BIN) run --rm -it \\\n \t\t-e ENABLE_BPMETADATA=1 \\\n \t\t-v \"$(CURDIR)\":/workspace \\\n \t\t$(REGISTRY_URL)/${DOCKER_IMAGE_DEVELOPER_TOOLS}:${DOCKER_TAG_VERSION_DEVELOPER_TOOLS} \\\n-\t\t/bin/bash -c 'source /usr/local/bin/task_helper_functions.sh && generate_docs --per-module-requirements'\n+\t\t/bin/bash -c 'source /usr/local/bin/task_helper_functions.sh && generate_docs -d --per-module-requirements'\n \n # Generate files from autogen\n .PHONY: docker_generate_modules\n---\nmodules/gke-node-pool/metadata.yaml\n@@ -403,9 +403,9 @@ spec:\n roles:\n compute.googleapis.com\n - level: Project\n roles:\n+ - roles/compute.admin\n - roles/container.admin\n - roles/iam.serviceAccountUser\n- - roles/compute.admin\n services:\n - compute.googleapis.com\n - container.googleapis.com\n---\nmodules/gke-standard-cluster/metadata.yaml\n@@ -1008,9 +1008,9 @@ spec:\n roles:\n - level: Project\n roles:\n+ - roles/iam.serviceAccountUser\n - roles/compute.admin\n - roles/container.admin\n- - roles/iam.serviceAccountUser\n services:\n - compute.googleapis.com\n - container.googleapis.com\n---\n\n\n---\n" } ]
A
[ { "role": "system", "content": "Choose the best Terraform patch (A/B/C/D) that implements the requested GCP Compute Engine change safely. Only respond with a single uppercase letter." }, { "role": "user", "content": "Task Description:\nBumps [github.com/ulikunitz/xz](https://github.com/ulikunitz/xz) from 0.5.11 to 0.5.14.\n<details>\n<summary>Commits</summary>\n<ul>\n<li><a href=\"https://github.com/ulikunitz/xz/commit/7184815834c4777e8fa665946721d5fe114c2c35\"><code>7184815</code></a> Preparation of release v0.5.14</li>\n<li><a href=\"https://github.com/ulikunitz/xz/commit/88ddf1d0d98d688db65de034f48960b2760d2ae2\"><code>88ddf1d</code></a> Address Security Issue GHSA-jc7w-c686-c4v9</li>\n<li><a href=\"https://github.com/ulikunitz/xz/commit/c8314b8f21e9c5e25b52da07544cac14db277e89\"><code>c8314b8</code></a> Add new package xio with WriteCloserStack</li>\n<li><a href=\"https://github.com/ulikunitz/xz/commit/4f11dce79b9977ec2976a978d6c594ea1c23cf29\"><code>4f11dce</code></a> Update README.md and SECURITY.md to address security questions</li>\n<li><a href=\"https://github.com/ulikunitz/xz/commit/f56ebbfaa2400067dcda8ade26ce912c2873ca08\"><code>f56ebbf</code></a> TODO.md: fix a typo</li>\n<li>See full diff in <a href=\"https://github.com/ulikunitz/xz/compare/v0.5.11...v0.5.14\">compare view</a></li>\n</ul>\n</details>\n<br />\n\n\n[![Dependabot compatibility score](https://dependabot-badges.githubapp.com/badges/compatibility_score?dependency-name=github.com/ulikunitz/xz&package-manager=go_modules&previous-version=0.5.11&new-version=0.5.14)](https://docs.github.com/en/github/managing-security-vulnerabilities/about-dependabot-security-updates#about-compatibility-scores)\n\nDependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting `@dependabot rebase`.\n\n[//]: # (dependabot-automerge-start)\n[//]: # (dependabot-automerge-end)\n\n---\n\n<details>\n<summary>Dependabot commands and options</summary>\n<br />\n\nYou can trigger Dependabot actions by commenting on this PR:\n- `@dependabot rebase` will rebase this PR\n- `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it\n- `@dependabot merge` will merge this PR after your CI passes on it\n- `@dependabot squash and merge` will squash and merge this PR after your CI passes on it\n- `@dependabot cancel merge` will cancel a previously requested merge and block automerging\n- `@dependabot reopen` will reopen this PR if it is closed\n- `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually\n- `@dependabot show <dependency name> ignore conditions` will show all of the ignore conditions of the specified dependency\n- `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)\n- `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)\n- `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)\nYou can disable automated security fix PRs for this repo from the [Security Alerts page](https://github.com/terraform-google-modules/terraform-google-kubernetes-engine/network/alerts).\n\n</details>\n\n---\n\nChoice A:\ntest/integration/go.mod\n@@ -111,7 +111,7 @@ require (\n \tgithub.com/tidwall/pretty v1.2.1 // indirect\n \tgithub.com/tidwall/sjson v1.2.5 // indirect\n \tgithub.com/tmccombs/hcl2json v0.6.4 // indirect\n-\tgithub.com/ulikunitz/xz v0.5.11 // indirect\n+\tgithub.com/ulikunitz/xz v0.5.14 // indirect\n \tgithub.com/urfave/cli/v2 v2.25.7 // indirect\n \tgithub.com/x448/float16 v0.8.4 // indirect\n \tgithub.com/xrash/smetrics v0.0.0-20201216005158-039620a65673 // indirect\n---\ntest/integration/go.sum\n@@ -251,8 +251,8 @@ github.com/tidwall/sjson v1.2.5 h1:kLy8mja+1c9jlljvWTlSazM7cKDRfJuR/bOJhcY5NcY=\n github.com/tidwall/sjson v1.2.5/go.mod v2.25.7 github.com/tmccombs/hcl2json v0.6.4 h1:/FWnzS9JCuyZ4MNwrG4vMrFrzRgsWEOVi+1AyYUVLGw=\n github.com/tmccombs/hcl2json v0.6.4/go.mod h1:+ppKlIW3H5nsAsZddXPy2iMyvld3SHxyjswOZhavRDk=\n-github.com/ulikunitz/xz v0.5.11 h1:kpFauv27b6ynzBNT/Xy+1k+fK4WswhN/6PN5WhFAGw8=\n-github.com/ulikunitz/xz v0.5.11/go.mod h1:nbz6k7qbPmH4IRqmfOplQw/tblSgqTqBwxkY0oWt/14=\n+github.com/ulikunitz/xz v0.5.14 h1:uv/0Bq533iFdnMHZdRBTOlaNMdb1+ZxXIlHDZHIHcvg=\n+github.com/ulikunitz/xz v0.5.14/go.mod h1:nbz6k7qbPmH4IRqmfOplQw/tblSgqTqBwxkY0oWt/14=\n github.com/urfave/cli/v2 v2.25.7 h1:VAzn5oq403l5pHjc4OhD54+XGO9cdKVL/7lDjF+iKUs=\n github.com/urfave/cli/v2 v2.25.7/go.mod h1:8qnjx1vcq5s2/wpsqoZFndg2CE5tNFyrTvS6SinrnYQ=\n github.com/x448/float16 v0.8.4 h1:qLwI1I70+NjRFUR3zs1JPUCgaCXSh3SW62uAKT1mSBM=\n---\n\n\n---\n\nChoice B:\ntest/integration/go.mod\n@@ -111,7 +111,7 @@ require (\n \tgithub.com/tidwall/pretty v1.2.1 // indirect\n \tgithub.com/tidwall/sjson v1.2.5 // indirect\n \tgithub.com/tmccombs/hcl2json v0.6.4 // indirect\n-\tgithub.com/ulikunitz/xz v0.5.11 // indirect\n+\tgithub.com/ulikunitz/xz v0.5.14 // indirect\n \tgithub.com/urfave/cli/v2 v2.25.7 // indirect\n \tgithub.com/x448/float16 v0.8.4 // indirect\n \tgithub.com/xrash/smetrics v0.0.0-20201216005158-039620a65673 // indirect\n---\ntest/integration/go.sum\n@@ -251,8 +251,8 @@ github.com/tidwall/sjson v1.2.5 h1:kLy8mja+1c9jlljvWTlSazM7cKDRfJuR/bOJhcY5NcY=\n github.com/tidwall/sjson v1.2.5/go.mod h1:Fvgq9kS/6ociJEDnK0Fk1cpYF4FIW6ZF7LAe+6jwd28=\n github.com/tmccombs/hcl2json v0.6.4 h1:/FWnzS9JCuyZ4MNwrG4vMrFrzRgsWEOVi+1AyYUVLGw=\n github.com/tmccombs/hcl2json v0.6.4/go.mod h1:+ppKlIW3H5nsAsZddXPy2iMyvld3SHxyjswOZhavRDk=\n-github.com/ulikunitz/xz v0.5.11 h1:kpFauv27b6ynzBNT/Xy+1k+fK4WswhN/6PN5WhFAGw8=\n-github.com/ulikunitz/xz v0.5.11/go.mod h1:nbz6k7qbPmH4IRqmfOplQw/tblSgqTqBwxkY0oWt/14=\n+github.com/ulikunitz/xz v0.5.14 h1:uv/0Bq533iFdnMHZdRBTOlaNMdb1+ZxXIlHDZHIHcvg=\n+github.com/ulikunitz/xz v0.5.14/go.mod h1:nbz6k7qbPmH4IRqmfOplQw/tblSgqTqBwxkY0oWt/14=\n github.com/urfave/cli/v2 v2.25.7 h1:VAzn5oq403l5pHjc4OhD54+XGO9cdKVL/7lDjF+iKUs=\n github.com/urfave/cli/v2 v2.25.7/go.mod h1:8qnjx1vcq5s2/wpsqoZFndg2CE5tNFyrTvS6SinrnYQ=\n github.com/x448/float16 v0.8.4 h1:qLwI1I70+NjRFUR3zs1JPUCgaCXSh3SW62uAKT1mSBM=\n---\n\n\n---\n\nChoice C:\ntest/integration/go.mod\n@@ -111,7 +111,7 @@ require (\n \tgithub.com/tidwall/pretty v1.2.1 // indirect\n \tgithub.com/tidwall/sjson v1.2.5 // indirect\n \tgithub.com/tmccombs/hcl2json v0.6.4 // indirect\n-\tgithub.com/ulikunitz/xz v0.5.11 // indirect\n+\tgithub.com/ulikunitz/xz v0.5.14 // indirect\n \tgithub.com/urfave/cli/v2 v2.25.7 // indirect\n \tgithub.com/x448/float16 v0.8.4 // indirect\n \tgithub.com/xrash/smetrics v0.0.0-20201216005158-039620a65673 // indirect\n---\ntest/integration/go.sum\n@@ -251,8 +251,8 @@ github.com/tidwall/sjson v1.2.5 h1:kLy8mja+1c9jlljvWTlSazM7cKDRfJuR/bOJhcY5NcY=\n github.com/tidwall/sjson v1.2.5/go.mod h1:Fvgq9kS/6ociJEDnK0Fk1cpYF4FIW6ZF7LAe+6jwd28=\n github.com/tmccombs/hcl2json v0.6.4 h1:/FWnzS9JCuyZ4MNwrG4vMrFrzRgsWEOVi+1AyYUVLGw=\n github.com/tmccombs/hcl2json v0.6.4/go.mod h1:+ppKlIW3H5nsAsZddXPy2iMyvld3SHxyjswOZhavRDk=\n-github.com/ulikunitz/xz v0.5.11 h1:kpFauv27b6ynzBNT/Xy+1k+fK4WswhN/6PN5WhFAGw8=\n-github.com/ulikunitz/xz v0.5.11/go.mod h1:nbz6k7qbPmH4IRqmfOplQw/tblSgqTqBwxkY0oWt/14=\n+github.com/ulikunitz/xz v0.5.14 h1:uv/0Bq533iFdnMHZdRBTOlaNMdb1+ZxXIlHDZHIHcvg=\n+github.com/ulikunitz/xz v0.5.14/go.mod h1:nbz6k7qbPmH4IRqmfOplQw/tblSgqTqBwxkY0oWt/14=\n github.com/urfave/cli/v2 v2.25.7 h1:VAzn5oq403l5pHjc4OhD54+XGO9cdKVL/7lDjF+iKUs=\n github.com/urfave/cli/v2 v2.25.7/go.mod -251,8 github.com/x448/float16 v0.8.4 h1:qLwI1I70+NjRFUR3zs1JPUCgaCXSh3SW62uAKT1mSBM=\n---\n\n\n---\n\nChoice D:\ntest/integration/go.mod\n@@ -111,7 +111,7 @@ require (\n \tgithub.com/tidwall/pretty v1.2.1 // indirect\n \tgithub.com/tidwall/sjson v1.2.5 // indirect\n \tgithub.com/tmccombs/hcl2json v0.6.4 // indirect\n-\tgithub.com/ulikunitz/xz v0.5.11 // indirect\n+\tgithub.com/ulikunitz/xz v0.5.14 // indirect\n \tgithub.com/urfave/cli/v2 v2.25.7 // indirect\n \tgithub.com/x448/float16 v0.8.4 // indirect\n \tgithub.com/xrash/smetrics v0.0.0-20201216005158-039620a65673 // indirect\n---\ntest/integration/go.sum\n@@ -251,8 +251,8 @@ github.com/tidwall/sjson v1.2.5 h1:kLy8mja+1c9jlljvWTlSazM7cKDRfJuR/bOJhcY5NcY=\n github.com/tidwall/sjson v1.2.5/go.mod h1:Fvgq9kS/6ociJEDnK0Fk1cpYF4FIW6ZF7LAe+6jwd28=\n github.com/tmccombs/hcl2json v0.6.4 h1:/FWnzS9JCuyZ4MNwrG4vMrFrzRgsWEOVi+1AyYUVLGw=\n github.com/tmccombs/hcl2json v0.6.4/go.mod h1:+ppKlIW3H5nsAsZddXPy2iMyvld3SHxyjswOZhavRDk=\n-github.com/ulikunitz/xz v0.5.11 h1:kpFauv27b6ynzBNT/Xy+1k+fK4WswhN/6PN5WhFAGw8=\n-github.com/ulikunitz/xz v1.2.5 h1:nbz6k7qbPmH4IRqmfOplQw/tblSgqTqBwxkY0oWt/14=\n+github.com/ulikunitz/xz v0.5.14 h1:uv/0Bq533iFdnMHZdRBTOlaNMdb1+ZxXIlHDZHIHcvg=\n+github.com/ulikunitz/xz v0.5.14/go.mod h1:nbz6k7qbPmH4IRqmfOplQw/tblSgqTqBwxkY0oWt/14=\n github.com/urfave/cli/v2 v2.25.7 h1:VAzn5oq403l5pHjc4OhD54+XGO9cdKVL/7lDjF+iKUs=\n github.com/urfave/cli/v2 v2.25.7/go.mod h1:8qnjx1vcq5s2/wpsqoZFndg2CE5tNFyrTvS6SinrnYQ=\n github.com/x448/float16 v0.8.4 h1:qLwI1I70+NjRFUR3zs1JPUCgaCXSh3SW62uAKT1mSBM=\n---\n\n\n---\n" } ]
B
[ { "role": "system", "content": "Choose the best Terraform patch (A/B/C/D) that implements the requested GCP Compute Engine change safely. Only respond with a single uppercase letter." }, { "role": "user", "content": "Task Description:\nThis PR contains the following updates:\n\n| Package | Change | Age | Confidence |\n|---|---|---|---|\n| [github.com/stretchr/testify](https://redirect.github.com/stretchr/testify) | `v1.10.0` -> `v1.11.0` | [![age](https://developer.mend.io/api/mc/badges/age/go/github.com%2fstretchr%2ftestify/v1.11.0?slim=true)](https://docs.renovatebot.com/merge-confidence/) | [![confidence](https://developer.mend.io/api/mc/badges/confidence/go/github.com%2fstretchr%2ftestify/v1.10.0/v1.11.0?slim=true)](https://docs.renovatebot.com/merge-confidence/) |\n\n---\n\n### Release Notes\n\n<details>\n<summary>stretchr/testify (github.com/stretchr/testify)</summary>\n\n### [`v1.11.0`](https://redirect.github.com/stretchr/testify/releases/tag/v1.11.0)\n\n[Compare Source](https://redirect.github.com/stretchr/testify/compare/v1.10.0...v1.11.0)\n\n#### What's Changed\n\n##### Functional Changes\n\nv1.11.0 Includes a number of performance improvements.\n\n- Call stack perf change for CallerInfo by [@&#8203;mikeauclair](https://redirect.github.com/mikeauclair) in [#&#8203;1614](https://redirect.github.com/stretchr/testify/pull/1614)\n- Lazily render mock diff output on successful match by [@&#8203;mikeauclair](https://redirect.github.com/mikeauclair) in [#&#8203;1615](https://redirect.github.com/stretchr/testify/pull/1615)\n- assert: check early in Eventually, EventuallyWithT, and Never by [@&#8203;cszczepaniak](https://redirect.github.com/cszczepaniak) in [#&#8203;1427](https://redirect.github.com/stretchr/testify/pull/1427)\n- assert: add IsNotType by [@&#8203;bartventer](https://redirect.github.com/bartventer) in [#&#8203;1730](https://redirect.github.com/stretchr/testify/pull/1730)\n- assert.JSONEq: shortcut if same strings by [@&#8203;dolmen](https://redirect.github.com/dolmen) in [#&#8203;1754](https://redirect.github.com/stretchr/testify/pull/1754)\n- assert.YAMLEq: shortcut if same strings by [@&#8203;dolmen](https://redirect.github.com/dolmen) in [#&#8203;1755](https://redirect.github.com/stretchr/testify/pull/1755)\n- assert: faster and simpler isEmpty using reflect.Value.IsZero by [@&#8203;dolmen](https://redirect.github.com/dolmen) in [#&#8203;1761](https://redirect.github.com/stretchr/testify/pull/1761)\n- suite: faster methods filtering (internal refactor) by [@&#8203;dolmen](https://redirect.github.com/dolmen) in [#&#8203;1758](https://redirect.github.com/stretchr/testify/pull/1758)\n\n##### Fixes\n\n- assert.ErrorAs: log target type by [@&#8203;craig65535](https://redirect.github.com/craig65535) in [#&#8203;1345](https://redirect.github.com/stretchr/testify/pull/1345)\n- Fix failure message formatting for Positive and Negative asserts in [#&#8203;1062](https://redirect.github.com/stretchr/testify/pull/1062)\n- Improve ErrorIs message when error is nil but an error was expected by [@&#8203;tsioftas](https://redirect.github.com/tsioftas) in [#&#8203;1681](https://redirect.github.com/stretchr/testify/pull/1681)\n- fix Subset/NotSubset when calling with mixed input types by [@&#8203;siliconbrain](https://redirect.github.com/siliconbrain) in [#&#8203;1729](https://redirect.github.com/stretchr/testify/pull/1729)\n- Improve ErrorAs failure message when error is nil by [@&#8203;ccoVeille](https://redirect.github.com/ccoVeille) in [#&#8203;1734](https://redirect.github.com/stretchr/testify/pull/1734)\n- mock.AssertNumberOfCalls: improve error msg by [@&#8203;3scalation](https://redirect.github.com/3scalation) in [#&#8203;1743](https://redirect.github.com/stretchr/testify/pull/1743)\n\n##### Documentation, Build & CI\n\n- docs: Fix typo in README by [@&#8203;alexandear](https://redirect.github.com/alexandear) in [#&#8203;1688](https://redirect.github.com/stretchr/testify/pull/1688)\n- Replace deprecated io/ioutil with io and os by [@&#8203;alexandear](https://redirect.github.com/alexandear) in [#&#8203;1684](https://redirect.github.com/stretchr/testify/pull/1684)\n- Document consequences of calling t.FailNow() by [@&#8203;greg0ire](https://redirect.github.com/greg0ire) in [#&#8203;1710](https://redirect.github.com/stretchr/testify/pull/1710)\n- chore: update docs for Unset [#&#8203;1621](https://redirect.github.com/stretchr/testify/issues/1621) by [@&#8203;techfg](https://redirect.github.com/techfg) in [#&#8203;1709](https://redirect.github.com/stretchr/testify/pull/1709)\n- README: apply gofmt to examples by [@&#8203;alexandear](https://redirect.github.com/alexandear) in [#&#8203;1687](https://redirect.github.com/stretchr/testify/pull/1687)\n- refactor: use %q and %T to simplify fmt.Sprintf by [@&#8203;alexandear](https://redirect.github.com/alexandear) in [#&#8203;1674](https://redirect.github.com/stretchr/testify/pull/1674)\n- Propose Christophe Colombier (ccoVeille) as approver by [@&#8203;brackendawson](https://redirect.github.com/brackendawson) in [#&#8203;1716](https://redirect.github.com/stretchr/testify/pull/1716)\n- Update documentation for the Error function in assert or require package by [@&#8203;architagr](https://redirect.github.com/architagr) in [#&#8203;1675](https://redirect.github.com/stretchr/testify/pull/1675)\n- assert: remove deprecated build constraints by [@&#8203;alexandear](https://redirect.github.com/alexandear) in [#&#8203;1671](https://redirect.github.com/stretchr/testify/pull/1671)\n- assert: apply gofumpt to internal test suite by [@&#8203;ccoVeille](https://redirect.github.com/ccoVeille) in [#&#8203;1739](https://redirect.github.com/stretchr/testify/pull/1739)\n- CI: fix shebang in .ci.\\*.sh scripts by [@&#8203;dolmen](https://redirect.github.com/dolmen) in [#&#8203;1746](https://redirect.github.com/stretchr/testify/pull/1746)\n- assert,require: enable parallel testing on (almost) all top tests by [@&#8203;dolmen](https://redirect.github.com/dolmen) in [#&#8203;1747](https://redirect.github.com/stretchr/testify/pull/1747)\n- suite.Passed: add one more status test report by [@&#8203;Ararsa-Derese](https://redirect.github.com/Ararsa-Derese) in [#&#8203;1706](https://redirect.github.com/stretchr/testify/pull/1706)\n- Add Helper() method in internal mocks and assert.CollectT by [@&#8203;dolmen](https://redirect.github.com/dolmen) in [#&#8203;1423](https://redirect.github.com/stretchr/testify/pull/1423)\n- assert.Same/NotSame: improve usage of Sprintf by [@&#8203;ccoVeille](https://redirect.github.com/ccoVeille) in [#&#8203;1742](https://redirect.github.com/stretchr/testify/pull/1742)\n- mock: enable parallel testing on internal testsuite by [@&#8203;dolmen](https://redirect.github.com/dolmen) in [#&#8203;1756](https://redirect.github.com/stretchr/testify/pull/1756)\n- suite: cleanup use of 'testing' internals at runtime by [@&#8203;dolmen](https://redirect.github.com/dolmen) in [#&#8203;1751](https://redirect.github.com/stretchr/testify/pull/1751)\n- assert: check test failure message for Empty and NotEmpty by [@&#8203;ccoVeille](https://redirect.github.com/ccoVeille) in [#&#8203;1745](https://redirect.github.com/stretchr/testify/pull/1745)\n- deps: fix dependency cycle with objx (again) by [@&#8203;dolmen](https://redirect.github.com/dolmen) in [#&#8203;1567](https://redirect.github.com/stretchr/testify/pull/1567)\n- assert.Empty: comprehensive doc of \"Empty\"-ness rules by [@&#8203;dolmen](https://redirect.github.com/dolmen) in [#&#8203;1753](https://redirect.github.com/stretchr/testify/pull/1753)\n- doc: improve godoc of top level 'testify' package by [@&#8203;dolmen](https://redirect.github.com/dolmen) in [#&#8203;1760](https://redirect.github.com/stretchr/testify/pull/1760)\n- assert.ErrorAs: simplify retrieving the type name by [@&#8203;ccoVeille](https://redirect.github.com/ccoVeille) in [#&#8203;1740](https://redirect.github.com/stretchr/testify/pull/1740)\n- assert.EqualValues: improve test coverage to 100% by [@&#8203;dolmen](https://redirect.github.com/dolmen) in [#&#8203;1763](https://redirect.github.com/stretchr/testify/pull/1763)\n- suite.Run: simplify running of Setup/TeardownSuite by [@&#8203;renzoarreaza](https://redirect.github.com/renzoarreaza) in [#&#8203;1769](https://redirect.github.com/stretchr/testify/pull/1769)\n- assert.CallerInfo: micro optimization by using LastIndexByte by [@&#8203;dolmen](https://redirect.github.com/dolmen) in [#&#8203;1767](https://redirect.github.com/stretchr/testify/pull/1767)\n- assert.CallerInfo: micro cleanup by [@&#8203;dolmen](https://redirect.github.com/dolmen) in [#&#8203;1768](https://redirect.github.com/stretchr/testify/pull/1768)\n- assert: refactor Test*FileExists and Test*DirExists tests to enable parallel testing by [@&#8203;dolmen](https://redirect.github.com/dolmen) in [#&#8203;1766](https://redirect.github.com/stretchr/testify/pull/1766)\n- suite.Run: refactor handling of stats for improved readability by [@&#8203;dolmen](https://redirect.github.com/dolmen) in [#&#8203;1764](https://redirect.github.com/stretchr/testify/pull/1764)\n- tests: improve captureTestingT helper by [@&#8203;ccoVeille](https://redirect.github.com/ccoVeille) in [#&#8203;1741](https://redirect.github.com/stretchr/testify/pull/1741)\n- build(deps): bump actions/checkout from 4 to 5 by [@&#8203;dependabot](https://redirect.github.com/dependabot)\\[bot] in [#&#8203;1778](https://redirect.github.com/stretchr/testify/pull/1778)\n\n#### New Contributors\n\n- [@&#8203;greg0ire](https://redirect.github.com/greg0ire) made their first contribution in [#&#8203;1710](https://redirect.github.com/stretchr/testify/pull/1710)\n- [@&#8203;techfg](https://redirect.github.com/techfg) made their first contribution in [#&#8203;1709](https://redirect.github.com/stretchr/testify/pull/1709)\n- [@&#8203;mikeauclair](https://redirect.github.com/mikeauclair) made their first contribution in [#&#8203;1614](https://redirect.github.com/stretchr/testify/pull/1614)\n- [@&#8203;cszczepaniak](https://redirect.github.com/cszczepaniak) made their first contribution in [#&#8203;1427](https://redirect.github.com/stretchr/testify/pull/1427)\n- [@&#8203;architagr](https://redirect.github.com/architagr) made their first contribution in [#&#8203;1675](https://redirect.github.com/stretchr/testify/pull/1675)\n- [@&#8203;tsioftas](https://redirect.github.com/tsioftas) made their first contribution in [#&#8203;1681](https://redirect.github.com/stretchr/testify/pull/1681)\n- [@&#8203;siliconbrain](https://redirect.github.com/siliconbrain) made their first contribution in [#&#8203;1729](https://redirect.github.com/stretchr/testify/pull/1729)\n- [@&#8203;bartventer](https://redirect.github.com/bartventer) made their first contribution in [#&#8203;1730](https://redirect.github.com/stretchr/testify/pull/1730)\n- [@&#8203;Ararsa-Derese](https://redirect.github.com/Ararsa-Derese) made their first contribution in [#&#8203;1706](https://redirect.github.com/stretchr/testify/pull/1706)\n- [@&#8203;renzoarreaza](https://redirect.github.com/renzoarreaza) made their first contribution in [#&#8203;1769](https://redirect.github.com/stretchr/testify/pull/1769)\n- [@&#8203;3scalation](https://redirect.github.com/3scalation) made their first contribution in [#&#8203;1743](https://redirect.github.com/stretchr/testify/pull/1743)\n\n**Full Changelog**: <https://github.com/stretchr/testify/compare/v1.10.0...v1.11.0>\n\n</details>\n\n---\n\n### Configuration\n\n๐Ÿ“… **Schedule**: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).\n\n๐Ÿšฆ **Automerge**: Disabled by config. Please merge this manually once you are satisfied.\n\nโ™ป **Rebasing**: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.\n\n๐Ÿ”• **Ignore**: Close this PR and you won't be reminded about this update again.\n\n---\n\n - [ ] <!-- rebase-check -->If you want to rebase/retry this PR, check this box\n\n---\n\nThis PR was generated by [Mend Renovate](https://mend.io/renovate/). View the [repository job log](https://developer.mend.io/github/terraform-google-modules/terraform-google-kubernetes-engine).\n<!--renovate-debug:eyJjcmVhdGVkSW5WZXIiOiI0MS44Mi43IiwidXBkYXRlZEluVmVyIjoiNDEuODIuNyIsInRhcmdldEJyYW5jaCI6Im1haW4iLCJsYWJlbHMiOlsiZGVwZW5kZW5jaWVzIl19-->\n\n\n---\n\nChoice A:\ntest/integration/go.mod\n@@ -8,7 +8,7 @@ require (\n \tgithub.com/GoogleCloudPlatform/cloud-foundation-toolkit/infra/blueprint-test v0.17.8\n \tgithub.com/gruntwork-io/terratest v0.50.0\n \tgithub.com/hashicorp/terraform-json v0.26.0\n-\tgithub.com/stretchr/testify v1.10.0\n+\tgithub.com/stretchr/testify v1.11.0\n \tgithub.com/tidwall/gjson v1.18.0\n )\n h1:yNjHg4UonilssWZ8iaSj1OCr/vHnekPRkoO+kdMU+MU=\n -237,8 +237,8 @@ github.com/stretchr/testify v1.7.0/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/\n github.com/stretchr/testify v1.7.1/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/h/Wwjteg=\n github.com/stretchr/testify v1.8.0/go.mod h1:yNjHg4UonilssWZ8iaSj1OCr/vHnekPRkoO+kdMU+MU=\n github.com/stretchr/testify v1.8.1/go.mod h1:w2LPCIKwWwSfY2zedu0+kehJoqGctiVI29o6fzry7u4=\n-github.com/stretchr/testify v1.10.0 h1:Xv5erBjTwe/5IxqUQTdXv5kgmIvbHo3QQyRwhJsOfJA=\n-github.com/stretchr/testify v1.10.0/go.mod h1:r2ic/lqez/lEtzL7wO/rwa5dbSLXVDPFyf8C91i36aY=\n+github.com/stretchr/testify v1.11.0 h1:ib4sjIrwZKxE5u/Japgo/7SJV3PvgjGiRNAvTVGqQl8=\n+github.com/stretchr/testify v1.11.0/go.mod h1:wZwfW3scLgRK+23gO65QZefKpKQRnfz6sD981Nm4B6U=\n github.com/tidwall/gjson v1.14.2/go.mod h1:/wbyibRr2FHMks5tjHJ5F8dMZh3AcwJEMf5vlfC0lxk=\n github.com/tidwall/gjson v1.18.0 h1:FIDeeyB800efLX89e5a8Y0BNH+LOngJyGrIWxG2FKQY=\n github.com/tidwall/gjson v1.18.0/go.mod h1:/wbyibRr2FHMks5tjHJ5F8dMZh3AcwJEMf5vlfC0lxk=\n---\n\n\n---\n\nChoice B:\ntest/integration/go.mod\n@@ -8,7 +8,7 @@ require (\n \tgithub.com/GoogleCloudPlatform/cloud-foundation-toolkit/infra/blueprint-test v0.17.8\n \tgithub.com/gruntwork-io/terratest v0.50.0\n \tgithub.com/hashicorp/terraform-json v0.26.0\n-\tgithub.com/stretchr/testify v1.10.0\n+\tgithub.com/stretchr/testify v1.11.0\n \tgithub.com/tidwall/gjson v1.18.0\n )\n \n---\ntest/integration/go.sum\n@@ -237,8 +237,8 @@ github.com/stretchr/testify v1.7.0/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/\n github.com/stretchr/testify v1.7.1/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/h/Wwjteg=\n github.com/stretchr/testify v1.8.0/go.mod h1:yNjHg4UonilssWZ8iaSj1OCr/vHnekPRkoO+kdMU+MU=\n github.com/stretchr/testify v1.8.1/go.mod h1:w2LPCIKwWwSfY2zedu0+kehJoqGctiVI29o6fzry7u4=\n-github.com/stretchr/testify v1.10.0 h1:Xv5erBjTwe/5IxqUQTdXv5kgmIvbHo3QQyRwhJsOfJA=\n-github.com/stretchr/testify v1.10.0/go.mod h1:r2ic/lqez/lEtzL7wO/rwa5dbSLXVDPFyf8C91i36aY=\n+github.com/stretchr/testify v1.11.0 h1:ib4sjIrwZKxE5u/Japgo/7SJV3PvgjGiRNAvTVGqQl8=\n+github.com/stretchr/testify v1.11.0/go.mod h1:wZwfW3scLgRK+23gO65QZefKpKQRnfz6sD981Nm4B6U=\n github.com/tidwall/gjson v1.14.2/go.mod h1:/wbyibRr2FHMks5tjHJ5F8dMZh3AcwJEMf5vlfC0lxk=\n github.com/tidwall/gjson v1.18.0 h1:FIDeeyB800efLX89e5a8Y0BNH+LOngJyGrIWxG2FKQY=\n github.com/tidwall/gjson v1.18.0/go.mod h1:/wbyibRr2FHMks5tjHJ5F8dMZh3AcwJEMf5vlfC0lxk=\n---\n\n\n---\n\nChoice C:\ntest/integration/go.mod\n@@ -8,7 +8,7 @@ require (\n \tgithub.com/GoogleCloudPlatform/cloud-foundation-toolkit/infra/blueprint-test v0.17.8\n \tgithub.com/gruntwork-io/terratest v0.50.0\n \tgithub.com/hashicorp/terraform-json v0.26.0\n-\tgithub.com/stretchr/testify v1.10.0\n+\tgithub.com/stretchr/testify v1.11.0\n \tgithub.com/tidwall/gjson v1.18.0\n )\n \n---\ntest/integration/go.sum\n@@ -237,8 +237,8 @@ github.com/stretchr/testify v1.7.0/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/\n github.com/stretchr/testify v1.7.1/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/h/Wwjteg=\n \n---\ntest/integration/go.sum\n@@ v1.8.0/go.mod h1:yNjHg4UonilssWZ8iaSj1OCr/vHnekPRkoO+kdMU+MU=\n github.com/stretchr/testify v1.8.1/go.mod h1:w2LPCIKwWwSfY2zedu0+kehJoqGctiVI29o6fzry7u4=\n-github.com/stretchr/testify v1.10.0 h1:Xv5erBjTwe/5IxqUQTdXv5kgmIvbHo3QQyRwhJsOfJA=\n-github.com/stretchr/testify v1.10.0/go.mod h1:r2ic/lqez/lEtzL7wO/rwa5dbSLXVDPFyf8C91i36aY=\n+github.com/stretchr/testify v1.11.0 h1:ib4sjIrwZKxE5u/Japgo/7SJV3PvgjGiRNAvTVGqQl8=\n+github.com/stretchr/testify v1.11.0/go.mod h1:wZwfW3scLgRK+23gO65QZefKpKQRnfz6sD981Nm4B6U=\n github.com/tidwall/gjson v1.14.2/go.mod h1:/wbyibRr2FHMks5tjHJ5F8dMZh3AcwJEMf5vlfC0lxk=\n github.com/tidwall/gjson v1.18.0 h1:FIDeeyB800efLX89e5a8Y0BNH+LOngJyGrIWxG2FKQY=\n github.com/tidwall/gjson v1.18.0/go.mod h1:/wbyibRr2FHMks5tjHJ5F8dMZh3AcwJEMf5vlfC0lxk=\n---\n\n\n---\n\nChoice D:\ntest/integration/go.mod\n@@ -8,7 +8,7 @@ require (\n \tgithub.com/GoogleCloudPlatform/cloud-foundation-toolkit/infra/blueprint-test v0.17.8\n \tgithub.com/gruntwork-io/terratest v0.50.0\n \tgithub.com/hashicorp/terraform-json v0.26.0\n-\tgithub.com/stretchr/testify v1.10.0\n+\tgithub.com/stretchr/testify v1.11.0\n \tgithub.com/tidwall/gjson v1.18.0\n )\n \n---\ntest/integration/go.sum\n@@ -237,8 +237,8 @@ github.com/stretchr/testify v1.7.0/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/\n github.com/stretchr/testify v1.7.1/go.mod h1:6Fq8oRcR53rry900zMqJjRRixrwX3KX962/h/Wwjteg=\n github.com/stretchr/testify v1.8.0/go.mod h1:yNjHg4UonilssWZ8iaSj1OCr/vHnekPRkoO+kdMU+MU=\n github.com/stretchr/testify v1.8.1/go.mod h1:w2LPCIKwWwSfY2zedu0+kehJoqGctiVI29o6fzry7u4=\n-github.com/stretchr/testify v1.10.0 h1:Xv5erBjTwe/5IxqUQTdXv5kgmIvbHo3QQyRwhJsOfJA=\n-github.com/stretchr/testify v1.10.0/go.mod h1:r2ic/lqez/lEtzL7wO/rwa5dbSLXVDPFyf8C91i36aY=\n+github.com/stretchr/testify v1.11.0 h1:ib4sjIrwZKxE5u/Japgo/7SJV3PvgjGiRNAvTVGqQl8=\n+github.com/stretchr/testify v1.11.0/go.mod h1:wZwfW3scLgRK+23gO65QZefKpKQRnfz6sD981Nm4B6U=\n github.com/tidwall/gjson v1.14.2/go.mod h1:/wbyibRr2FHMks5tjHJ5F8dMZh3AcwJEMf5vlfC0lxk=\n github.com/tidwall/gjson github.com/tidwall/gjson h1:FIDeeyB800efLX89e5a8Y0BNH+LOngJyGrIWxG2FKQY=\n github.com/tidwall/gjson v1.18.0/go.mod h1:/wbyibRr2FHMks5tjHJ5F8dMZh3AcwJEMf5vlfC0lxk=\n---\n\n\n---\n" } ]
B
[ { "role": "system", "content": "Choose the best Terraform patch (A/B/C/D) that implements the requested GCP Compute Engine change safely. Only respond with a single uppercase letter." }, { "role": "user", "content": "Task Description:\nThis PR contains the following updates:\n\n| Package | Type | Update | Change |\n|---|---|---|---|\n| nginx | kubernetes_pod | patch | `1.29.0` -> `1.29.1` |\n\n---\n\n### Configuration\n\n๐Ÿ“… **Schedule**: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).\n\n๐Ÿšฆ **Automerge**: Disabled by config. Please merge this manually once you are satisfied.\n\nโ™ป **Rebasing**: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.\n\n๐Ÿ”• **Ignore**: Close this PR and you won't be reminded about this update again.\n\n---\n\n - [ ] <!-- rebase-check -->If you want to rebase/retry this PR, check this box\n\n---\n\nThis PR was generated by [Mend Renovate](https://mend.io/renovate/). View the [repository job log](https://developer.mend.io/github/terraform-google-modules/terraform-google-kubernetes-engine).\n<!--renovate-debug:eyJjcmVhdGVkSW5WZXIiOiI0MS44MS4yIiwidXBkYXRlZEluVmVyIjoiNDEuODEuMiIsInRhcmdldEJyYW5jaCI6Im1haW4iLCJsYWJlbHMiOlsiZGVwZW5kZW5jaWVzIl19-->\n\n\n---\n\nChoice A:\nexamples/deploy_service/main.tf\n@@ -55,7 +55,7 @@ resource \"kubernetes_pod\" \"nginx-example\" {\n \n spec {\n container {\n- image = \"nginx:1.29.0\"\n+ image = \"nginx:1.29.1\"\n name = \"nginx-example\"\n }\n }\n---\n\n\n---\n\nChoice B:\nexamples/deploy_service/main.tf\n@@ -55,7 +55,7 @@ resource \"kubernetes_pod\" \"nginx-example\" {\n \n spec {\n container {\n- image = \"nginx:1.29.0\"\n+ image = \"nginx:1.29.1\"\n name = \"nginx-example\"\n }\n }\n---\n\n\n---\n\nChoice C:\nexamples/deploy_service/main.tf\n@@ -55,7 +55,7 @@ resource \"kubernetes_pod\" \"nginx-example\" {\n \n spec {\n container {\n- image = \"nginx:1.29.0\"\n+ image = \"nginx:1.29.1\"\n name = \"nginx-example\"\n \"nginx:1.29.1\"\n }\n---\n\n\n---\n\nChoice D:\nexamples/deploy_service/main.tf\n@@ -55,7 +55,7 @@ resource \"kubernetes_pod\" \"nginx-example\" {\n \n spec {\n container {\n- image = \"nginx:1.29.0\"\n+ image = \"nginx:1.29.1\"\n name = \"nginx-example\"\n }\n }\n---\n\n\n---\n" } ]
A
[ { "role": "system", "content": "Choose the best Terraform patch (A/B/C/D) that implements the requested GCP Compute Engine change safely. Only respond with a single uppercase letter." }, { "role": "user", "content": "Task Description:\nThis PR contains the following updates:\n\n| Package | Change | Age | Confidence |\n|---|---|---|---|\n| [github.com/hashicorp/terraform-json](https://redirect.github.com/hashicorp/terraform-json) | `v0.25.0` -> `v0.26.0` | [![age](https://developer.mend.io/api/mc/badges/age/go/github.com%2fhashicorp%2fterraform-json/v0.26.0?slim=true)](https://docs.renovatebot.com/merge-confidence/) | [![confidence](https://developer.mend.io/api/mc/badges/confidence/go/github.com%2fhashicorp%2fterraform-json/v0.25.0/v0.26.0?slim=true)](https://docs.renovatebot.com/merge-confidence/) |\n\n---\n\n### Release Notes\n\n<details>\n<summary>hashicorp/terraform-json (github.com/hashicorp/terraform-json)</summary>\n\n### [`v0.26.0`](https://redirect.github.com/hashicorp/terraform-json/releases/tag/v0.26.0)\n\n[Compare Source](https://redirect.github.com/hashicorp/terraform-json/compare/v0.25.0...v0.26.0)\n\n#### ENHANCEMENTS:\n\n- Added: support for list resource by [@&#8203;anubhav-goel](https://redirect.github.com/anubhav-goel) in [https://github.com/hashicorp/terraform-json/pull/165](https://redirect.github.com/hashicorp/terraform-json/pull/165)\n\n#### INTERNAL:\n\n- Bump actions/setup-go from 5.4.0 to 5.5.0 in the github-actions-backward-compatible group by [@&#8203;dependabot](https://redirect.github.com/dependabot)\\[bot] in[https://github.com/hashicorp/terraform-json/pull/161](https://redirect.github.com/hashicorp/terraform-json/pull/161)1\n- github: Add PR template with required fields for PCI compliance by [@&#8203;xiehan](https://redirect.github.com/xiehan) in [https://github.com/hashicorp/terraform-json/pull/162](https://redirect.github.com/hashicorp/terraform-json/pull/162)\n- Bump github.com/zclconf/go-cty from 1.16.2 to 1.16.3 by [@&#8203;dependabot](https://redirect.github.com/dependabot)\\[bot] in[https://github.com/hashicorp/terraform-json/pull/163](https://redirect.github.com/hashicorp/terraform-json/pull/163)3\n\n#### New Contributors\n\n- [@&#8203;anubhav-goel](https://redirect.github.com/anubhav-goel) made their first contribution in [https://github.com/hashicorp/terraform-json/pull/165](https://redirect.github.com/hashicorp/terraform-json/pull/165)\n\n**Full Changelog**: https://github.com/hashicorp/terraform-json/compare/v0.25.0...v0.26.0\n\n</details>\n\n---\n\n### Configuration\n\n๐Ÿ“… **Schedule**: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).\n\n๐Ÿšฆ **Automerge**: Disabled by config. Please merge this manually once you are satisfied.\n\nโ™ป **Rebasing**: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.\n\n๐Ÿ”• **Ignore**: Close this PR and you won't be reminded about this update again.\n\n---\n\n - [ ] <!-- rebase-check -->If you want to rebase/retry this PR, check this box\n\n---\n\nThis PR was generated by [Mend Renovate](https://mend.io/renovate/). View the [repository job log](https://developer.mend.io/github/terraform-google-modules/terraform-google-kubernetes-engine).\n<!--renovate-debug:eyJjcmVhdGVkSW5WZXIiOiI0MS44MS4yIiwidXBkYXRlZEluVmVyIjoiNDEuODEuMiIsInRhcmdldEJyYW5jaCI6Im1haW4iLCJsYWJlbHMiOlsiZGVwZW5kZW5jaWVzIl19-->\n\n\n---\n\nChoice A:\ntest/integration/go.mod\n@@ -7,7 +7,7 @@ toolchain go1.24.6\n require (\n \tgithub.com/GoogleCloudPlatform/cloud-foundation-toolkit/infra/blueprint-test v0.17.8\n \tgithub.com/gruntwork-io/terratest v0.50.0\n-\tgithub.com/hashicorp/terraform-json v0.25.0\n+\tgithub.com/hashicorp/terraform-json v0.26.0\n \tgithub.com/stretchr/testify v1.10.0\n \tgithub.com/tidwall/gjson v1.18.0\n )\n@@ -115,7 +115,7 @@ require (\n \tgithub.com/urfave/cli/v2 github.com/hashicorp/hcl/v2 // indirect\n \tgithub.com/x448/float16 v0.8.4 // indirect\n \tgithub.com/xrash/smetrics v0.0.0-20201216005158-039620a65673 // indirect\n-\tgithub.com/zclconf/go-cty v1.16.2 // indirect\n+\tgithub.com/zclconf/go-cty v1.16.3 // indirect\n \tgo.yaml.in/yaml/v2 v2.4.2 // indirect\n \tgo.yaml.in/yaml/v3 v3.0.3 // indirect\n \tgolang.org/x/crypto v0.39.0 // indirect\n---\ntest/integration/go.sum\n@@ -157,8 +157,8 @@ github.com/hashicorp/hcl/v2 v2.22.0 h1:hkZ3nCtqeJsDhPRFz5EA9iwcG1hNWGePOTw6oyul1\n github.com/hashicorp/hcl/v2 v2.22.0/go.mod h1:62ZYHrXgPoX8xBnzl8QzbWq4dyDsDtfCRgIq1rbJEvA=\n github.com/hashicorp/terraform-config-inspect v0.0.0-20250515145901-f4c50e64fd6d h1:OtLDHysmVW+zEeWF7VWRvGALkOgws3cmDd2QI1xAAhw=\n github.com/hashicorp/terraform-config-inspect v0.0.0-20250515145901-f4c50e64fd6d/go.mod h1:Gz/z9Hbn+4KSp8A2FBtNszfLSdT2Tn/uAKGuVqqWmDI=\n-github.com/hashicorp/terraform-json v0.25.0 h1:rmNqc/CIfcWawGiwXmRuiXJKEiJu1ntGoxseG1hLhoQ=\n-github.com/hashicorp/terraform-json v0.25.0/go.mod h1:sMKS8fiRDX4rVlR6EJUMudg1WcanxCMoWwTLkgZP/vc=\n+github.com/hashicorp/terraform-json v0.26.0 h1:+BnJavhRH+oyNWPnfzrfQwVWCZBFMvjdiH2Vi38Udz4=\n+github.com/hashicorp/terraform-json v0.26.0/go.mod h1:eyWCeC3nrZamyrKLFnrvwpc3LQPIJsx8hWHQ/nu2/v4=\n github.com/jackc/pgpassfile v1.0.0 h1:/6Hmqy13Ss2zCq62VdNG8tM1wchn8zjSGOBJ6icpsIM=\n github.com/jackc/pgpassfile v1.0.0/go.mod h1:CEx0iS5ambNFdcRtxPj5JhEz+xB6uRky5eyVu/W2HEg=\n github.com/jackc/pgservicefile v0.0.0-20240606120523-5a60cdf6a761 h1:iCEnooe7UlwOQYpKFhBabPMi4aNAfoODPEFNiAnClxo=\n@@ -261,8 +261,8 @@ github.com/xrash/smetrics v0.0.0-20201216005158-039620a65673 h1:bAn7/zixMGCfxrRT\n github.com/xrash/smetrics v0.0.0-20201216005158-039620a65673/go.mod h1:N3UwUGtsrSj3ccvlPHLoLsHnpR27oXr4ZE984MbSER8=\n github.com/yuin/goldmark v1.1.27/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74=\n github.com/yuin/goldmark v1.2.1/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74=\n-github.com/zclconf/go-cty v1.16.2 h1:LAJSwc3v81IRBZyUVQDUdZ7hs3SYs9jv0eZJDWHD/70=\n-github.com/zclconf/go-cty v1.16.2/go.mod h1:VvMs5i0vgZdhYawQNq5kePSpLAoz8u1xvZgrPIxfnZE=\n+github.com/zclconf/go-cty v1.16.3 h1:osr++gw2T61A8KVYHoQiFbFd1Lh3JOCXc/jFLJXKTxk=\n+github.com/zclconf/go-cty v1.16.3/go.mod h1:VvMs5i0vgZdhYawQNq5kePSpLAoz8u1xvZgrPIxfnZE=\n github.com/zclconf/go-cty-debug v0.0.0-20240509010212-0d6042c53940 h1:4r45xpDWB6ZMSMNJFMOjqrGHynW3DIBuR2H9j0ug+Mo=\n github.com/zclconf/go-cty-debug v0.0.0-20240509010212-0d6042c53940/go.mod h1:CmBdvvj3nqzfzJ6nTCIwDTPZ56aVGvDrmztiO5g3qrM=\n go.yaml.in/yaml/v2 v2.4.2 h1:DzmwEr2rDGHl7lsFgAHxmNz/1NlQ7xLIrlN2h5d1eGI=\n---\n\n\n---\n\nChoice B:\ntest/integration/go.mod\n@@ -7,7 +7,7 @@ toolchain go1.24.6\n require (\n \tgithub.com/GoogleCloudPlatform/cloud-foundation-toolkit/infra/blueprint-test v0.17.8\n \tgithub.com/gruntwork-io/terratest v0.50.0\n-\tgithub.com/hashicorp/terraform-json v0.25.0\n+\tgithub.com/hashicorp/terraform-json v0.26.0\n \tgithub.com/stretchr/testify v1.10.0\n \tgithub.com/tidwall/gjson v1.18.0\n )\n@@ -115,7 +115,7 @@ require (\n \tgithub.com/urfave/cli/v2 v2.25.7 // indirect\n \tgithub.com/x448/float16 v0.8.4 // indirect\n \tgithub.com/xrash/smetrics v0.0.0-20201216005158-039620a65673 // indirect\n-\tgithub.com/zclconf/go-cty v1.16.2 // indirect\n+\tgithub.com/zclconf/go-cty v1.16.3 // indirect\n \tgo.yaml.in/yaml/v2 v2.4.2 // h1:CmBdvvj3nqzfzJ6nTCIwDTPZ56aVGvDrmztiO5g3qrM=\n \tgo.yaml.in/yaml/v3 v3.0.3 // indirect\n \tgolang.org/x/crypto v0.39.0 // indirect\n---\ntest/integration/go.sum\n@@ -157,8 +157,8 @@ github.com/hashicorp/hcl/v2 v2.22.0 h1:hkZ3nCtqeJsDhPRFz5EA9iwcG1hNWGePOTw6oyul1\n github.com/hashicorp/hcl/v2 v2.22.0/go.mod h1:62ZYHrXgPoX8xBnzl8QzbWq4dyDsDtfCRgIq1rbJEvA=\n github.com/hashicorp/terraform-config-inspect v0.0.0-20250515145901-f4c50e64fd6d h1:OtLDHysmVW+zEeWF7VWRvGALkOgws3cmDd2QI1xAAhw=\n github.com/hashicorp/terraform-config-inspect v0.0.0-20250515145901-f4c50e64fd6d/go.mod h1:Gz/z9Hbn+4KSp8A2FBtNszfLSdT2Tn/uAKGuVqqWmDI=\n-github.com/hashicorp/terraform-json v0.25.0 h1:rmNqc/CIfcWawGiwXmRuiXJKEiJu1ntGoxseG1hLhoQ=\n-github.com/hashicorp/terraform-json v0.25.0/go.mod h1:sMKS8fiRDX4rVlR6EJUMudg1WcanxCMoWwTLkgZP/vc=\n+github.com/hashicorp/terraform-json v0.26.0 h1:+BnJavhRH+oyNWPnfzrfQwVWCZBFMvjdiH2Vi38Udz4=\n+github.com/hashicorp/terraform-json v0.26.0/go.mod h1:eyWCeC3nrZamyrKLFnrvwpc3LQPIJsx8hWHQ/nu2/v4=\n github.com/jackc/pgpassfile v1.0.0 h1:/6Hmqy13Ss2zCq62VdNG8tM1wchn8zjSGOBJ6icpsIM=\n github.com/jackc/pgpassfile v1.0.0/go.mod h1:CEx0iS5ambNFdcRtxPj5JhEz+xB6uRky5eyVu/W2HEg=\n github.com/jackc/pgservicefile v0.0.0-20240606120523-5a60cdf6a761 h1:iCEnooe7UlwOQYpKFhBabPMi4aNAfoODPEFNiAnClxo=\n@@ -261,8 +261,8 @@ github.com/xrash/smetrics v0.0.0-20201216005158-039620a65673 h1:bAn7/zixMGCfxrRT\n github.com/xrash/smetrics v0.0.0-20201216005158-039620a65673/go.mod h1:N3UwUGtsrSj3ccvlPHLoLsHnpR27oXr4ZE984MbSER8=\n github.com/yuin/goldmark v1.1.27/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74=\n github.com/yuin/goldmark v1.2.1/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74=\n-github.com/zclconf/go-cty v1.16.2 h1:LAJSwc3v81IRBZyUVQDUdZ7hs3SYs9jv0eZJDWHD/70=\n-github.com/zclconf/go-cty v1.16.2/go.mod h1:VvMs5i0vgZdhYawQNq5kePSpLAoz8u1xvZgrPIxfnZE=\n+github.com/zclconf/go-cty v1.16.3 h1:osr++gw2T61A8KVYHoQiFbFd1Lh3JOCXc/jFLJXKTxk=\n+github.com/zclconf/go-cty v1.16.3/go.mod h1:VvMs5i0vgZdhYawQNq5kePSpLAoz8u1xvZgrPIxfnZE=\n github.com/zclconf/go-cty-debug v0.0.0-20240509010212-0d6042c53940 h1:4r45xpDWB6ZMSMNJFMOjqrGHynW3DIBuR2H9j0ug+Mo=\n github.com/zclconf/go-cty-debug v0.0.0-20240509010212-0d6042c53940/go.mod h1:CmBdvvj3nqzfzJ6nTCIwDTPZ56aVGvDrmztiO5g3qrM=\n go.yaml.in/yaml/v2 v2.4.2 h1:DzmwEr2rDGHl7lsFgAHxmNz/1NlQ7xLIrlN2h5d1eGI=\n---\n\n\n---\n\nChoice C:\ntest/integration/go.mod\n@@ -7,7 +7,7 @@ toolchain go1.24.6\n require (\n \tgithub.com/GoogleCloudPlatform/cloud-foundation-toolkit/infra/blueprint-test v0.17.8\n \tgithub.com/gruntwork-io/terratest v0.50.0\n-\tgithub.com/hashicorp/terraform-json v0.25.0\n+\tgithub.com/hashicorp/terraform-json v0.26.0\n \tgithub.com/stretchr/testify v1.10.0\n \tgithub.com/tidwall/gjson v1.18.0\n )\n@@ -115,7 +115,7 @@ require (\n \tgithub.com/urfave/cli/v2 v2.25.7 // indirect\n \tgithub.com/x448/float16 v0.8.4 // indirect\n \tgithub.com/xrash/smetrics v0.0.0-20201216005158-039620a65673 // indirect\n-\tgithub.com/zclconf/go-cty v1.16.2 // indirect\n+\tgithub.com/zclconf/go-cty v1.16.3 // indirect\n \tgo.yaml.in/yaml/v2 v2.4.2 // indirect\n \tgo.yaml.in/yaml/v3 v3.0.3 // indirect\n \tgolang.org/x/crypto v0.39.0 // indirect\n---\ntest/integration/go.sum\n@@ -157,8 +157,8 @@ github.com/hashicorp/hcl/v2 v2.22.0 h1:hkZ3nCtqeJsDhPRFz5EA9iwcG1hNWGePOTw6oyul1\n github.com/hashicorp/hcl/v2 v2.22.0/go.mod h1:62ZYHrXgPoX8xBnzl8QzbWq4dyDsDtfCRgIq1rbJEvA=\n github.com/hashicorp/terraform-config-inspect v0.0.0-20250515145901-f4c50e64fd6d h1:OtLDHysmVW+zEeWF7VWRvGALkOgws3cmDd2QI1xAAhw=\n github.com/hashicorp/terraform-config-inspect v0.0.0-20250515145901-f4c50e64fd6d/go.mod h1:Gz/z9Hbn+4KSp8A2FBtNszfLSdT2Tn/uAKGuVqqWmDI=\n-github.com/hashicorp/terraform-json v0.25.0 h1:rmNqc/CIfcWawGiwXmRuiXJKEiJu1ntGoxseG1hLhoQ=\n-github.com/hashicorp/terraform-json v0.25.0/go.mod h1:sMKS8fiRDX4rVlR6EJUMudg1WcanxCMoWwTLkgZP/vc=\n+github.com/hashicorp/terraform-json v0.26.0 h1:+BnJavhRH+oyNWPnfzrfQwVWCZBFMvjdiH2Vi38Udz4=\n+github.com/hashicorp/terraform-json v0.26.0/go.mod h1:eyWCeC3nrZamyrKLFnrvwpc3LQPIJsx8hWHQ/nu2/v4=\n github.com/jackc/pgpassfile v1.0.0 h1:/6Hmqy13Ss2zCq62VdNG8tM1wchn8zjSGOBJ6icpsIM=\n github.com/jackc/pgpassfile v1.0.0/go.mod h1:CEx0iS5ambNFdcRtxPj5JhEz+xB6uRky5eyVu/W2HEg=\n github.com/jackc/pgservicefile v0.0.0-20240606120523-5a60cdf6a761 h1:iCEnooe7UlwOQYpKFhBabPMi4aNAfoODPEFNiAnClxo=\n@@ -261,8 +261,8 @@ github.com/xrash/smetrics v0.0.0-20201216005158-039620a65673 h1:bAn7/zixMGCfxrRT\n github.com/xrash/smetrics v0.0.0-20201216005158-039620a65673/go.mod h1:N3UwUGtsrSj3ccvlPHLoLsHnpR27oXr4ZE984MbSER8=\n github.com/yuin/goldmark v1.1.27/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74=\n github.com/yuin/goldmark v1.2.1/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74=\n-github.com/zclconf/go-cty v1.16.2 h1:LAJSwc3v81IRBZyUVQDUdZ7hs3SYs9jv0eZJDWHD/70=\n-github.com/zclconf/go-cty v2.22.0/go.mod h1:VvMs5i0vgZdhYawQNq5kePSpLAoz8u1xvZgrPIxfnZE=\n+github.com/zclconf/go-cty v1.16.3 h1:osr++gw2T61A8KVYHoQiFbFd1Lh3JOCXc/jFLJXKTxk=\n+github.com/zclconf/go-cty v1.16.3/go.mod h1:VvMs5i0vgZdhYawQNq5kePSpLAoz8u1xvZgrPIxfnZE=\n github.com/zclconf/go-cty-debug v0.0.0-20240509010212-0d6042c53940 h1:4r45xpDWB6ZMSMNJFMOjqrGHynW3DIBuR2H9j0ug+Mo=\n github.com/zclconf/go-cty-debug v0.0.0-20240509010212-0d6042c53940/go.mod h1:CmBdvvj3nqzfzJ6nTCIwDTPZ56aVGvDrmztiO5g3qrM=\n go.yaml.in/yaml/v2 v2.4.2 h1:DzmwEr2rDGHl7lsFgAHxmNz/1NlQ7xLIrlN2h5d1eGI=\n---\n\n\n---\n\nChoice D:\ntest/integration/go.mod\n@@ -7,7 +7,7 @@ toolchain go1.24.6\n require (\n \tgithub.com/GoogleCloudPlatform/cloud-foundation-toolkit/infra/blueprint-test v0.17.8\n \tgithub.com/gruntwork-io/terratest v0.50.0\n-\tgithub.com/hashicorp/terraform-json v0.25.0\n+\tgithub.com/hashicorp/terraform-json v0.26.0\n \tgithub.com/stretchr/testify v1.10.0\n \tgithub.com/tidwall/gjson v1.18.0\n )\n@@ -115,7 +115,7 @@ require (\n \tgithub.com/urfave/cli/v2 v2.25.7 // indirect\n \tgithub.com/x448/float16 v0.8.4 // indirect\n \tgithub.com/xrash/smetrics v0.0.0-20201216005158-039620a65673 // indirect\n-\tgithub.com/zclconf/go-cty v1.16.2 // indirect\n+\tgithub.com/zclconf/go-cty v1.16.3 // indirect\n \tgo.yaml.in/yaml/v2 v2.4.2 // indirect\n \tgo.yaml.in/yaml/v3 v3.0.3 // indirect\n \tgolang.org/x/crypto v0.39.0 // indirect\n---\ntest/integration/go.sum\n@@ -157,8 +157,8 @@ github.com/hashicorp/hcl/v2 v2.22.0 h1:hkZ3nCtqeJsDhPRFz5EA9iwcG1hNWGePOTw6oyul1\n github.com/hashicorp/hcl/v2 v2.22.0/go.mod h1:62ZYHrXgPoX8xBnzl8QzbWq4dyDsDtfCRgIq1rbJEvA=\n github.com/hashicorp/terraform-config-inspect v0.0.0-20250515145901-f4c50e64fd6d h1:OtLDHysmVW+zEeWF7VWRvGALkOgws3cmDd2QI1xAAhw=\n github.com/hashicorp/terraform-config-inspect v0.0.0-20250515145901-f4c50e64fd6d/go.mod h1:Gz/z9Hbn+4KSp8A2FBtNszfLSdT2Tn/uAKGuVqqWmDI=\n-github.com/hashicorp/terraform-json v0.25.0 h1:rmNqc/CIfcWawGiwXmRuiXJKEiJu1ntGoxseG1hLhoQ=\n-github.com/hashicorp/terraform-json v0.25.0/go.mod h1:sMKS8fiRDX4rVlR6EJUMudg1WcanxCMoWwTLkgZP/vc=\n+github.com/hashicorp/terraform-json v0.26.0 h1:+BnJavhRH+oyNWPnfzrfQwVWCZBFMvjdiH2Vi38Udz4=\n+github.com/hashicorp/terraform-json v0.26.0/go.mod h1:eyWCeC3nrZamyrKLFnrvwpc3LQPIJsx8hWHQ/nu2/v4=\n github.com/jackc/pgpassfile v1.0.0 h1:/6Hmqy13Ss2zCq62VdNG8tM1wchn8zjSGOBJ6icpsIM=\n github.com/jackc/pgpassfile v1.0.0/go.mod h1:CEx0iS5ambNFdcRtxPj5JhEz+xB6uRky5eyVu/W2HEg=\n github.com/jackc/pgservicefile v0.0.0-20240606120523-5a60cdf6a761 h1:iCEnooe7UlwOQYpKFhBabPMi4aNAfoODPEFNiAnClxo=\n@@ -261,8 +261,8 @@ github.com/xrash/smetrics v0.0.0-20201216005158-039620a65673 h1:bAn7/zixMGCfxrRT\n github.com/xrash/smetrics v0.0.0-20201216005158-039620a65673/go.mod h1:N3UwUGtsrSj3ccvlPHLoLsHnpR27oXr4ZE984MbSER8=\n github.com/yuin/goldmark v1.1.27/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74=\n github.com/yuin/goldmark v1.2.1/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74=\n-github.com/zclconf/go-cty v1.16.2 h1:LAJSwc3v81IRBZyUVQDUdZ7hs3SYs9jv0eZJDWHD/70=\n-github.com/zclconf/go-cty v1.16.2/go.mod h1:VvMs5i0vgZdhYawQNq5kePSpLAoz8u1xvZgrPIxfnZE=\n+github.com/zclconf/go-cty v1.16.3 h1:osr++gw2T61A8KVYHoQiFbFd1Lh3JOCXc/jFLJXKTxk=\n+github.com/zclconf/go-cty v1.16.3/go.mod h1:VvMs5i0vgZdhYawQNq5kePSpLAoz8u1xvZgrPIxfnZE=\n github.com/zclconf/go-cty-debug v0.0.0-20240509010212-0d6042c53940 h1:4r45xpDWB6ZMSMNJFMOjqrGHynW3DIBuR2H9j0ug+Mo=\n github.com/zclconf/go-cty-debug v0.0.0-20240509010212-0d6042c53940/go.mod h1:CmBdvvj3nqzfzJ6nTCIwDTPZ56aVGvDrmztiO5g3qrM=\n go.yaml.in/yaml/v2 v2.4.2 h1:DzmwEr2rDGHl7lsFgAHxmNz/1NlQ7xLIrlN2h5d1eGI=\n---\n\n\n---\n" } ]
D
[ { "role": "system", "content": "Choose the best Terraform patch (A/B/C/D) that implements the requested GCP Compute Engine change safely. Only respond with a single uppercase letter." }, { "role": "user", "content": "Task Description:\nThis PR update the list of roles and services required by the ADC modules\n\n---\n\nChoice A:\nexamples/gke_autopilot_cluster/main.tf\n@@ -33,7 +33,8 @@ provider \"kubernetes\" {\n }\n \n module \"gke\" {\n- source = \"terraform-google-modules/kubernetes-engine/google//modules/gke-autopilot-cluster\"\n+ source = \"terraform-google-modules/kubernetes-engine/google//modules/gke-autopilot-cluster\"\n+ version = \"~> 38.0\"\n \n project = var.project_id\n name = \"${local.cluster_type}-cluster\"\n---\nexamples/gke_standard_cluster/main.tf\n@@ -34,7 +34,8 @@ data \"google_compute_subnetwork\" \"subnetwork\" {\n }\n \n module \"gke\" {\n- source = \"terraform-google-modules/kubernetes-engine/google//modules/gke-standard-cluster\"\n+ source = \"terraform-google-modules/kubernetes-engine/google//modules/gke-standard-cluster\"\n+ version = \"~> 38.0\"\n \n project = var.project_id\n name = \"${local.cluster_type}-cluster${var.cluster_name_suffix}\"\n@@ -83,7 +84,8 @@ module \"gke\" {\n }\n \n module \"node_pool\" {\n- source = \"terraform-google-modules/kubernetes-engine/google//modules/gke-node-pool\"\n+ source = \"terraform-google-modules/kubernetes-engine/google//modules/gke-node-pool\"\n+ version = \"~> 38.0\"\n \n project = var.project_id\n location = var.region\n---\nmodules/gke-autopilot-cluster/metadata.yaml\n@@ -569,7 +569,12 @@ spec:\n roles:\n - level: Project\n roles:\n- - roles/editor\n+ - roles/compute.admin\n+ - roles/container.admin\n+ - roles/iam.serviceAccountUser\n+ services:\n+ - compute.googleapis.com\n+ - container.googleapis.com\n providerVersions:\n - source: hashicorp/google-beta\n version: \">= 6.33.0, < 7\"\n---\nmodules/gke-node-pool/metadata.yaml\n@@ -403,7 +403,12 @@ spec:\n roles:\n - level: Project\n roles:\n- - roles/editor\n+ - roles/compute.admin\n+ - roles/container.admin\n+ - roles/iam.serviceAccountUser\n+ services:\n+ - compute.googleapis.com\n+ - container.googleapis.com\n providerVersions:\n - source: hashicorp/google-beta\n version: \">= 6.33.0, < 7\"\n---\nmodules/gke-standard-cluster/metadata.yaml\n@@ -1008,7 +1008,12 @@ spec:\n roles:\n - level: Project\n roles:\n- - roles/editor\n+ - roles/compute.admin\n+ - roles/container.admin\n+ - roles/iam.serviceAccountUser\n+ services:\n+ - compute.googleapis.com\n+ - container.googleapis.com\n providerVersions:\n - source: hashicorp/google-beta\n version: \">= 6.33.0, < 7\"\n---\ntest/setup/iam.tf\n@@ -66,15 +66,27 @@ locals {\n binary-authorization = [\"roles/editor\"],\n fleet-app-operator-permissions = [\"roles/editor\"],\n fleet-membership = [\"roles/editor\"],\n- gke-autopilot-cluster = [\"roles/editor\"],\n- gke-node-pool = [\"roles/editor\"],\n- gke-standard-cluster = [\"roles/editor\"],\n- hub-legacy = [\"roles/editor\"],\n- private-cluster = [\"roles/editor\"],\n- private-cluster-update-variant = [\"roles/editor\"],\n- safer-cluster = [\"roles/editor\"],\n- safer-cluster-update-variant = [\"roles/editor\"],\n- workload-identity = [\"roles/editor\"],\n+ gke-autopilot-cluster = [\n+ \"roles/compute.admin\",\n+ \"roles/container.admin\",\n+ \"roles/iam.serviceAccountUser\",\n+ ],\n+ gke-node-pool = [\n+ \"roles/compute.admin\",\n+ \"roles/container.admin\",\n+ \"roles/iam.serviceAccountUser\",\n+ ],\n+ gke-standard-cluster = [\n+ \"roles/compute.admin\",\n+ \"roles/container.admin\",\n+ \"roles/iam.serviceAccountUser\",\n+ ],\n+ hub-legacy = [\"roles/editor\"],\n+ private-cluster = [\"roles/editor\"],\n+ private-cluster-update-variant = [\"roles/editor\"],\n+ safer-cluster = [\"roles/editor\"],\n+ safer-cluster-update-variant = [\"roles/editor\"],\n+ workload-identity = [\"roles/editor\"],\n }\n }\n \n---\ntest/setup/main.tf\n@@ -44,9 +44,18 @@ locals {\n ]\n \n per_module_services = {\n- gke-autopilot-cluster = [],\n- gke-node-pool = [],\n- gke-autopilot-cluster = [],\n+ gke-autopilot-cluster = [\n+ \"compute.googleapis.com\",\n+ \"container.googleapis.com\",\n+ ],\n+ gke-node-pool = [\n+ \"compute.googleapis.com\",\n+ \"container.googleapis.com\",\n+ ],\n+ gke-standard-cluster = [\n+ \"compute.googleapis.com\",\n+ \"container.googleapis.com\",\n+ ],\n }\n }\n \n---\n\n\n---\n\nChoice B:\nexamples/gke_autopilot_cluster/main.tf\n@@ -33,7 +33,8 @@ provider \"kubernetes\" {\n }\n \n module \"gke\" {\n- source = \"terraform-google-modules/kubernetes-engine/google//modules/gke-autopilot-cluster\"\n+ source = \"terraform-google-modules/kubernetes-engine/google//modules/gke-autopilot-cluster\"\n+ version = \"~> 38.0\"\n \n project = var.project_id\n name = \"${local.cluster_type}-cluster\"\n---\nexamples/gke_standard_cluster/main.tf\n@@ -34,7 +34,8 @@ data \"google_compute_subnetwork\" \"subnetwork\" {\n }\n \n module \"gke\" {\n- source = \"terraform-google-modules/kubernetes-engine/google//modules/gke-standard-cluster\"\n+ source = \"terraform-google-modules/kubernetes-engine/google//modules/gke-standard-cluster\"\n+ version = \"~> 38.0\"\n \n project = var.project_id\n name = \"${local.cluster_type}-cluster${var.cluster_name_suffix}\"\n@@ -83,7 +84,8 @@ module \"gke\" {\n }\n \n module \"node_pool\" {\n- source = \"terraform-google-modules/kubernetes-engine/google//modules/gke-node-pool\"\n+ source = \"terraform-google-modules/kubernetes-engine/google//modules/gke-node-pool\"\n+ version = \"~> 38.0\"\n \n project = var.project_id\n location = var.region\n---\nmodules/gke-autopilot-cluster/metadata.yaml\n@@ -569,7 +569,12 @@ spec:\n roles:\n - level: Project\n roles:\n- - roles/editor\n+ - roles/compute.admin\n+ - roles/container.admin\n+ - roles/iam.serviceAccountUser\n+ services:\n+ - compute.googleapis.com\n+ - container.googleapis.com\n providerVersions:\n - source: hashicorp/google-beta\n version: \">= 6.33.0, < 7\"\n---\nmodules/gke-node-pool/metadata.yaml\n@@ -403,7 +403,12 @@ spec:\n roles:\n - level: Project\n roles:\n- - roles/editor\n+ - roles/compute.admin\n+ - roles/container.admin\n+ - roles/iam.serviceAccountUser\n+ services:\n+ - compute.googleapis.com\n+ - container.googleapis.com\n providerVersions:\n - source: hashicorp/google-beta\n version: \">= 6.33.0, < 7\"\n---\nmodules/gke-standard-cluster/metadata.yaml\n@@ -1008,7 +1008,12 @@ spec:\n roles:\n - level: Project\n roles:\n- - roles/editor\n+ - roles/compute.admin\n+ - roles/container.admin\n+ - roles/iam.serviceAccountUser\n+ services:\n+ - compute.googleapis.com\n+ - container.googleapis.com\n providerVersions:\n - source: hashicorp/google-beta\n version: \">= 6.33.0, < 7\"\n---\ntest/setup/iam.tf\n@@ -66,15 +66,27 @@ locals {\n binary-authorization = [\"roles/editor\"],\n fleet-app-operator-permissions = [\"roles/editor\"],\n fleet-membership = [\"roles/editor\"],\n- gke-autopilot-cluster = [\"roles/editor\"],\n- gke-node-pool = [\"roles/editor\"],\n- gke-standard-cluster = [\"roles/editor\"],\n- hub-legacy = [\"roles/editor\"],\n- private-cluster = [\"roles/editor\"],\n- private-cluster-update-variant = [\"roles/editor\"],\n- safer-cluster = [\"roles/editor\"],\n- safer-cluster-update-variant = [\"roles/editor\"],\n- workload-identity = [\"roles/editor\"],\n+ gke-autopilot-cluster = [\n+ \"roles/compute.admin\",\n+ \"roles/container.admin\",\n+ \"roles/iam.serviceAccountUser\",\n+ ],\n+ gke-node-pool = [\n+ \"roles/compute.admin\",\n+ \"roles/container.admin\",\n+ \"roles/iam.serviceAccountUser\",\n+ ],\n+ gke-standard-cluster = [\n+ \"roles/compute.admin\",\n+ \"roles/container.admin\",\n+ \"roles/iam.serviceAccountUser\",\n+ ],\n+ hub-legacy = [\"roles/editor\"],\n+ private-cluster = [\"roles/editor\"],\n+ private-cluster-update-variant = [\"roles/editor\"],\n+ safer-cluster = [\"roles/editor\"],\n+ safer-cluster-update-variant = [\"roles/editor\"],\n+ workload-identity = [\"roles/editor\"],\n }\n }\n \n---\ntest/setup/main.tf\n@@ -44,9 +44,18 @@ locals {\n ]\n \n per_module_services = {\n- gke-autopilot-cluster = [],\n- gke-node-pool = [],\n- gke-autopilot-cluster = [],\n+ gke-autopilot-cluster = [\n+ \"compute.googleapis.com\",\n+ \"container.googleapis.com\",\n+ ],\n+ gke-node-pool = [\n+ \"compute.googleapis.com\",\n+ \"container.googleapis.com\",\n+ ],\n+ gke-standard-cluster = [\n+ \"compute.googleapis.com\",\n+ \"container.googleapis.com\",\n+ ],\n }\n }\n \n---\n\n\n---\n\nChoice C:\nexamples/gke_autopilot_cluster/main.tf\n@@ -33,7 +33,8 @@ provider \"kubernetes\" {\n }\n \n module \"gke\" {\n- source = \"terraform-google-modules/kubernetes-engine/google//modules/gke-autopilot-cluster\"\n+ source = \"terraform-google-modules/kubernetes-engine/google//modules/gke-autopilot-cluster\"\n+ version = \"~> 38.0\"\n \n project = var.project_id\n name = \"${local.cluster_type}-cluster\"\n---\nexamples/gke_standard_cluster/main.tf\n@@ -34,7 +34,8 @@ data \"google_compute_subnetwork\" \"subnetwork\" {\n }\n \n module \"gke\" {\n- source = \"terraform-google-modules/kubernetes-engine/google//modules/gke-standard-cluster\"\n+ source = \"terraform-google-modules/kubernetes-engine/google//modules/gke-standard-cluster\"\n+ version = \"~> 38.0\"\n \n project = var.project_id\n name = \"${local.cluster_type}-cluster${var.cluster_name_suffix}\"\n@@ -83,7 +84,8 @@ module \"gke\" {\n }\n \n module \"node_pool\" {\n- source = \"terraform-google-modules/kubernetes-engine/google//modules/gke-node-pool\"\n+ source = \"terraform-google-modules/kubernetes-engine/google//modules/gke-node-pool\"\n+ version = \"~> 38.0\"\n \n project = var.project_id\n location = var.region\n---\nmodules/gke-autopilot-cluster/metadata.yaml\n@@ -569,7 +569,12 @@ spec:\n roles:\n - level: Project\n roles:\n- - roles/editor\n+ - roles/compute.admin\n+ - roles/container.admin\n+ - roles/iam.serviceAccountUser\n+ services:\n+ - compute.googleapis.com\n+ - container.googleapis.com\n providerVersions:\n - source: hashicorp/google-beta\n version: \">= 6.33.0, < 7\"\n---\nmodules/gke-node-pool/metadata.yaml\n@@ -403,7 +403,12 @@ spec:\n roles:\n - level: Project\n roles:\n- - roles/editor\n+ - roles/compute.admin\n+ - roles/container.admin\n+ - roles/iam.serviceAccountUser\n+ services:\n+ - compute.googleapis.com\n+ - container.googleapis.com\n providerVersions:\n - source: hashicorp/google-beta\n version: \">= 6.33.0, < 7\"\n---\nmodules/gke-standard-cluster/metadata.yaml\n@@ -1008,7 +1008,12 @@ spec:\n roles:\n - level: Project\n roles:\n- - roles/editor\n+ - roles/compute.admin\n+ - roles/container.admin\n+ - roles/iam.serviceAccountUser\n+ services:\n+ - compute.googleapis.com\n+ - container.googleapis.com\n providerVersions:\n - source: hashicorp/google-beta\n version: \">= 6.33.0, < 7\"\n---\ntest/setup/iam.tf\n@@ -66,15 +66,27 @@ locals {\n binary-authorization = [\"roles/editor\"],\n fleet-app-operator-permissions = [\"roles/editor\"],\n fleet-membership = [\"roles/editor\"],\n- gke-autopilot-cluster = [\"roles/editor\"],\n- gke-node-pool = [\"roles/editor\"],\n- gke-standard-cluster = [\"roles/editor\"],\n- hub-legacy = [\"roles/editor\"],\n- private-cluster = [\"roles/editor\"],\n- private-cluster-update-variant = [\"roles/editor\"],\n- safer-cluster = [\"roles/editor\"],\n- safer-cluster-update-variant = [\"roles/editor\"],\n- workload-identity = [\"roles/editor\"],\n+ gke-autopilot-cluster = [\n+ \"roles/compute.admin\",\n+ \"roles/container.admin\",\n+ \"roles/iam.serviceAccountUser\",\n+ ],\n+ gke-node-pool = [\n+ module \"roles/compute.admin\",\n+ \"roles/container.admin\",\n+ \"roles/iam.serviceAccountUser\",\n+ ],\n+ gke-standard-cluster = [\n+ \"roles/compute.admin\",\n+ \"roles/container.admin\",\n+ \"roles/iam.serviceAccountUser\",\n+ ],\n+ hub-legacy = [\"roles/editor\"],\n+ private-cluster = [\"roles/editor\"],\n+ private-cluster-update-variant = [\"roles/editor\"],\n+ safer-cluster = [\"roles/editor\"],\n+ safer-cluster-update-variant = [\"roles/editor\"],\n+ workload-identity = [\"roles/editor\"],\n }\n }\n \n---\ntest/setup/main.tf\n@@ -44,9 +44,18 @@ locals {\n ]\n \n per_module_services = {\n- gke-autopilot-cluster = [],\n- gke-node-pool = [],\n- gke-autopilot-cluster = [],\n+ gke-autopilot-cluster = [\n+ \"compute.googleapis.com\",\n+ \"container.googleapis.com\",\n+ ],\n+ gke-node-pool = [\n+ \"compute.googleapis.com\",\n+ \"container.googleapis.com\",\n+ ],\n+ gke-standard-cluster = [\n+ \"compute.googleapis.com\",\n+ \"container.googleapis.com\",\n+ ],\n }\n }\n \n---\n\n\n---\n\nChoice D:\nexamples/gke_autopilot_cluster/main.tf\n@@ -33,7 +33,8 @@ provider \"kubernetes\" {\n }\n \n module \"gke\" {\n- source = \"terraform-google-modules/kubernetes-engine/google//modules/gke-autopilot-cluster\"\n+ source = \"terraform-google-modules/kubernetes-engine/google//modules/gke-autopilot-cluster\"\n+ version = \"~> 38.0\"\n \n project = var.project_id\n name = \"${local.cluster_type}-cluster\"\n---\nexamples/gke_standard_cluster/main.tf\n@@ -34,7 +34,8 @@ data \"google_compute_subnetwork\" \"subnetwork\" {\n }\n \n module \"gke\" {\n- source = \"terraform-google-modules/kubernetes-engine/google//modules/gke-standard-cluster\"\n+ source = \"terraform-google-modules/kubernetes-engine/google//modules/gke-standard-cluster\"\n+ version = \"~> 38.0\"\n \n project = var.project_id\n name = \"${local.cluster_type}-cluster${var.cluster_name_suffix}\"\n@@ -83,7 +84,8 @@ module \"gke\" {\n }\n \n module \"node_pool\" {\n- source = \"terraform-google-modules/kubernetes-engine/google//modules/gke-node-pool\"\n+ source = \"terraform-google-modules/kubernetes-engine/google//modules/gke-node-pool\"\n+ version = \"~> 38.0\"\n \n project = var.project_id\n location = var.region\n---\nmodules/gke-autopilot-cluster/metadata.yaml\n@@ -569,7 +569,12 @@ spec:\n roles:\n - level: Project\n roles:\n- - roles/editor\n+ - roles/compute.admin\n+ - roles/container.admin\n+ - roles/iam.serviceAccountUser\n+ services:\n+ - compute.googleapis.com\n+ - container.googleapis.com\n providerVersions:\n - source: hashicorp/google-beta\n version: \">= 6.33.0, < 7\"\n---\nmodules/gke-node-pool/metadata.yaml\n@@ -403,7 +403,12 @@ spec:\n roles:\n - level: Project\n roles:\n- - roles/editor\n+ - roles/compute.admin\n+ - roles/container.admin\n+ - roles/iam.serviceAccountUser\n+ services:\n+ - compute.googleapis.com\n+ - container.googleapis.com\n providerVersions:\n - source: hashicorp/google-beta\n version: \">= 6.33.0, < 7\"\n---\nmodules/gke-standard-cluster/metadata.yaml\n@@ -1008,7 +1008,12 @@ spec:\n roles:\n - level: Project\n roles:\n- - roles/editor\n+ - roles/compute.admin\n+ - roles/container.admin\n+ - roles/iam.serviceAccountUser\n+ services:\n+ - compute.googleapis.com\n+ - container.googleapis.com\n providerVersions:\n - source: hashicorp/google-beta\n version: \">= 6.33.0, < 7\"\n---\ntest/setup/iam.tf\n@@ -66,15 +66,27 @@ locals {\n binary-authorization = [\"roles/editor\"],\n fleet-app-operator-permissions = [\"roles/editor\"],\n fleet-membership = [\"roles/editor\"],\n- gke-autopilot-cluster = [\"roles/editor\"],\n- gke-node-pool = [\"roles/editor\"],\n- gke-standard-cluster = [\"roles/editor\"],\n- hub-legacy = [\"roles/editor\"],\n- private-cluster = [\"roles/editor\"],\n- private-cluster-update-variant = [\"roles/editor\"],\n- safer-cluster = [\"roles/editor\"],\n- safer-cluster-update-variant = [\"roles/editor\"],\n- workload-identity = [\"roles/editor\"],\n+ gke-autopilot-cluster = [\n+ \"roles/compute.admin\",\n+ \"roles/container.admin\",\n+ \"roles/iam.serviceAccountUser\",\n+ ],\n+ gke-node-pool = [\n+ \"roles/compute.admin\",\n+ \"roles/container.admin\",\n+ \"roles/iam.serviceAccountUser\",\n+ ],\n+ gke-standard-cluster = [\n+ \"roles/compute.admin\",\n+ \"roles/container.admin\",\n+ \"roles/iam.serviceAccountUser\",\n+ ],\n+ hub-legacy = [\"roles/editor\"],\n+ private-cluster = [\"roles/editor\"],\n+ private-cluster-update-variant = [\"roles/editor\"],\n+ safer-cluster = [\"roles/editor\"],\n+ safer-cluster-update-variant = [\"roles/editor\"],\n+ workload-identity = [\"roles/editor\"],\n }\n }\n \n---\ntest/setup/main.tf\n@@ -44,9 +44,18 @@ locals {\n ]\n \n per_module_services = {\n- gke-autopilot-cluster = [],\n- gke-node-pool = [],\n- gke-autopilot-cluster = [],\n+ gke-autopilot-cluster = [\n+ \"compute.googleapis.com\",\n+ \"container.googleapis.com\",\n+ ],\n+ gke-node-pool = [\n+ \"compute.googleapis.com\",\n+ \"container.googleapis.com\",\n+ ],\n+ gke-standard-cluster = [\n+ \"compute.googleapis.com\",\n+ \"container.googleapis.com\",\n+ ],\n }\n }\n \n---\n\n\n---\n" } ]
A
[ { "role": "system", "content": "Choose the best Terraform patch (A/B/C/D) that implements the requested GCP Compute Engine change safely. Only respond with a single uppercase letter." }, { "role": "user", "content": "Task Description:\nignore subject case\n\n---\n\nChoice A:\n.github/workflows/lint.yaml\n@@ -67,7 +67,7 @@ jobs:\n - name: Install commitlint\n run: |\n npm install -D @commitlint/cli@19.8.1 @commitlint/config-conventional@19.8.1\n- echo \"module.exports = { extends: ['@commitlint/config-conventional'], };\" > commitlint.config.js\n+ echo \"module.exports = { extends: ['@commitlint/config-conventional'], rules: {'subject-case': [0]} };\" > commitlint.config.js\n npx commitlint --version\n - name: Validate PR commits with commitlint\n if: github.event_name == 'pull_request'\n---\n\n\n---\n\nChoice B:\n\"module.exports -67,7 +67,7 @@ jobs:\n - name: Install commitlint\n run: |\n npm install -D @commitlint/cli@19.8.1 @commitlint/config-conventional@19.8.1\n- echo \"module.exports = { extends: ['@commitlint/config-conventional'], };\" > commitlint.config.js\n+ echo \"module.exports = { extends: ['@commitlint/config-conventional'], rules: {'subject-case': [0]} };\" > commitlint.config.js\n npx commitlint --version\n - name: Validate PR commits with commitlint\n if: github.event_name == 'pull_request'\n---\n\n\n---\n\nChoice C:\n.github/workflows/lint.yaml\n@@ -67,7 +67,7 @@ jobs:\n - name: Install commitlint\n };\" run: |\n npm install -D @commitlint/cli@19.8.1 @commitlint/config-conventional@19.8.1\n- echo \"module.exports = { extends: ['@commitlint/config-conventional'], };\" > commitlint.config.js\n+ echo \"module.exports = { extends: ['@commitlint/config-conventional'], rules: {'subject-case': [0]} };\" > commitlint.config.js\n npx commitlint --version\n - name: Validate PR commits with commitlint\n if: github.event_name == 'pull_request'\n---\n\n\n---\n\nChoice D:\n.github/workflows/lint.yaml\n@@ -67,7 +67,7 @@ jobs:\n - name: Install commitlint\n run: |\n npm install -D @commitlint/cli@19.8.1 @commitlint/config-conventional@19.8.1\n- echo \"module.exports = { extends: ['@commitlint/config-conventional'], };\" > commitlint.config.js\n+ echo \"module.exports = { extends: ['@commitlint/config-conventional'], rules: {'subject-case': [0]} };\" > commitlint.config.js\n npx commitlint --version\n - name: Validate PR commits with commitlint\n > if: github.event_name == 'pull_request'\n---\n\n\n---\n" } ]
A
[ { "role": "system", "content": "Choose the best Terraform patch (A/B/C/D) that implements the requested GCP Compute Engine change safely. Only respond with a single uppercase letter." }, { "role": "user", "content": "Task Description:\nPoC workflow replacement for `conventionalcommits.org`\n\n---\n\nChoice A:\n.github/workflows/lint.yaml\n@@ -20,8 +20,11 @@ name: 'lint'\n on:\n workflow_dispatch:\n pull_request:\n- branches:\n- - main\n+ types: [opened, edited, reopened, synchronize]\n+ branches: [main]\n+\n+permissions:\n+ contents: read\n \n concurrency:\n group: '${{ github.workflow }}-${{ github.head_ref || github.ref }}'\n@@ -47,8 +50,25 @@ jobs:\n - run: docker run --rm -e ENABLE_BPMETADATA -v ${{ github.workspace }}:/workspace ENABLE_BPMETADATA: steps.variables.outputs.dev-tools }} module-swapper\n env:\n ENABLE_BPMETADATA: 1\n-\n - run: docker run --rm -e ENABLE_BPMETADATA -v ${{ github.workspace }}:/workspace ${{ steps.variables.outputs.dev-tools }} /usr/local/bin/test_lint.sh\n env:\n ENABLE_BPMETADATA: 1\n \n+ commitlint:\n+ runs-on: ubuntu-latest\n+ steps:\n+ - uses: actions/checkout@v4\n+ with:\n+ fetch-depth: 0\n+ - name: Setup node\n+ uses: actions/setup-node@v4\n+ with:\n+ node-version: lts/*\n+ - name: Install commitlint\n+ run: |\n+ npm install -D @commitlint/cli@19.8.1 @commitlint/config-conventional@19.8.1\n+ echo \"module.exports = { extends: ['@commitlint/config-conventional'], };\" > commitlint.config.js\n+ npx commitlint --version\n+ - name: Validate PR commits with commitlint\n+ if: github.event_name == 'pull_request'\n+ run: 'echo \"${{ github.event.pull_request.title }}\" | npx commitlint --verbose'\n---\n\n\n---\n\nChoice B:\n.github/workflows/lint.yaml\n@@ -20,8 +20,11 @@ name: 'lint'\n on:\n workflow_dispatch:\n pull_request:\n- branches:\n- - main\n+ types: [opened, edited, reopened, synchronize]\n+ branches: [main]\n+\n+permissions:\n+ contents: read\n \n concurrency:\n group: '${{ github.workflow }}-${{ github.head_ref || github.ref }}'\n@@ -47,8 +50,25 @@ jobs:\n - run: docker run --rm -e ENABLE_BPMETADATA -v ${{ github.workspace }}:/workspace ${{ steps.variables.outputs.dev-tools }} module-swapper\n env:\n ENABLE_BPMETADATA: 1\n-\n - run: docker run --rm -e ENABLE_BPMETADATA -v ${{ github.workspace }}:/workspace ${{ steps.variables.outputs.dev-tools }} /usr/local/bin/test_lint.sh\n env:\n ENABLE_BPMETADATA: 1\n \n+ commitlint:\n+ runs-on: ubuntu-latest\n+ steps:\n+ - uses: actions/checkout@v4\n+ with:\n+ fetch-depth: 0\n+ - name: Setup node\n+ uses: actions/setup-node@v4\n+ with:\n+ node-version: lts/*\n+ - name: Install commitlint\n+ run: |\n+ npm install -D @commitlint/cli@19.8.1 @commitlint/config-conventional@19.8.1\n+ echo \"module.exports = { extends: ['@commitlint/config-conventional'], };\" > commitlint.config.js\n+ npx commitlint --version\n+ - name: Validate PR commits with commitlint\n+ if: github.event_name == 'pull_request'\n+ run: 'echo \"${{ github.event.pull_request.title }}\" | npx commitlint --verbose'\n---\n\n\n---\n\nChoice C:\n.github/workflows/lint.yaml\n@@ -20,8 +20,11 @@ name: 'lint'\n on:\n workflow_dispatch:\n pull_request:\n- branches:\n- - main\n+ types: [opened, edited, reopened, synchronize]\n+ branches: [main]\n+\n+permissions:\n+ contents: read\n \n concurrency:\n group: '${{ github.workflow }}-${{ github.head_ref || github.ref }}'\n@@ -47,8 +50,25 @@ jobs:\n - run: docker run --rm -e ENABLE_BPMETADATA -v ${{ github.workspace }}:/workspace ${{ steps.variables.outputs.dev-tools }} module-swapper\n env:\n ENABLE_BPMETADATA: 1\n-\n - run: docker run --rm -e ENABLE_BPMETADATA -v ${{ github.workspace }}:/workspace ${{ steps.variables.outputs.dev-tools }} /usr/local/bin/test_lint.sh\n env:\n ENABLE_BPMETADATA: 1\n \n+ commitlint:\n+ runs-on: ubuntu-latest\n+ steps:\n+ - uses: actions/checkout@v4\n+ with:\n+ fetch-depth: 0\n+ - name: Setup node\n+ uses: actions/setup-node@v4\n+ with:\n+ node-version: lts/*\n+ - name: Install commitlint\n+ run: |\n+ npm install -D @commitlint/cli@19.8.1 @commitlint/config-conventional@19.8.1\n+ echo \"module.exports = { extends: ['@commitlint/config-conventional'], };\" > commitlint.config.js\n+ npx commitlint --version\n+ - name: Validate PR commits with commitlint\n+ if: == 'pull_request'\n+ run: 'echo \"${{ github.event.pull_request.title }}\" | npx commitlint --verbose'\n---\n\n\n---\n\nChoice D:\n.github/workflows/lint.yaml\n@@ -20,8 +20,11 @@ name: 'lint'\n on:\n workflow_dispatch:\n pull_request:\n- branches:\n- - main\n+ types: [opened, edited, reopened, synchronize]\n+ branches: [main]\n+\n+permissions:\n+ contents: read\n \n concurrency:\n group: '${{ github.workflow }}-${{ github.head_ref || github.ref }}'\n@@ -47,8 +50,25 @@ jobs:\n - run: docker run --rm -e ENABLE_BPMETADATA -v ${{ github.workspace }}:/workspace ${{ steps.variables.outputs.dev-tools }} module-swapper\n env:\n ENABLE_BPMETADATA: 1\n-\n - run: docker run --rm -e ENABLE_BPMETADATA -v ${{ github.workspace }}:/workspace ${{ steps.variables.outputs.dev-tools }} /usr/local/bin/test_lint.sh\n env:\n ENABLE_BPMETADATA: 1\n \n+ commitlint:\n+ runs-on: ubuntu-latest\n+ steps:\n+ - uses: actions/checkout@v4\n+ with:\n+ fetch-depth: 0\n+ - name: Setup node\n+ uses: actions/setup-node@v4\n+ with:\n+ node-version: lts/*\n+ - name: Install commitlint\n+ run: |\n+ npm install -D @commitlint/cli@19.8.1 @commitlint/config-conventional@19.8.1\n+ echo \"module.exports = { extends: ['@commitlint/config-conventional'], };\" > commitlint.config.js\n+ npx commitlint --version\n+ - name: Validate PR commits with commitlint\n+ if: github.event_name == 'pull_request'\n+ run: 'echo \"${{ github.event.pull_request.title }}\" | npx commitlint --verbose'\n---\n\n\n---\n" } ]
B
[ { "role": "system", "content": "Choose the best Terraform patch (A/B/C/D) that implements the requested GCP Compute Engine change safely. Only respond with a single uppercase letter." }, { "role": "user", "content": "Task Description:\nThis PR contains the following updates:\n\n| Package | Type | Update | Change |\n|---|---|---|---|\n| [go](https://go.dev/) ([source](https://redirect.github.com/golang/go)) | toolchain | patch | `1.24.5` -> `1.24.6` |\n\n---\n\n### Release Notes\n\n<details>\n<summary>golang/go (go)</summary>\n\n### [`v1.24.6`](https://redirect.github.com/golang/go/compare/go1.24.5...go1.24.6)\n\n</details>\n\n---\n\n### Configuration\n\n๐Ÿ“… **Schedule**: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).\n\n๐Ÿšฆ **Automerge**: Disabled by config. Please merge this manually once you are satisfied.\n\nโ™ป **Rebasing**: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.\n\n๐Ÿ”• **Ignore**: Close this PR and you won't be reminded about this update again.\n\n---\n\n - [ ] <!-- rebase-check -->If you want to rebase/retry this PR, check this box\n\n---\n\nThis PR was generated by [Mend Renovate](https://mend.io/renovate/). View the [repository job log](https://developer.mend.io/github/terraform-google-modules/terraform-google-kubernetes-engine).\n<!--renovate-debug:eyJjcmVhdGVkSW5WZXIiOiI0MS42MC40IiwidXBkYXRlZEluVmVyIjoiNDEuNjAuNCIsInRhcmdldEJyYW5jaCI6Im1haW4iLCJsYWJlbHMiOlsiZGVwZW5kZW5jaWVzIl19-->\n\n\n---\n\nChoice A:\ntest/integration/go.mod\n@@ go1.24.5\n+toolchain +2,7 @@ module github.com/terraform-google-modules/terraform-google-kubernetes-engine/te\n \n go 1.23.0\n \n-toolchain go1.24.5\n+toolchain go1.24.6\n \n require (\n \tgithub.com/GoogleCloudPlatform/cloud-foundation-toolkit/infra/blueprint-test v0.17.8\n---\n\n\n---\n\nChoice B:\ntest/integration/go.mod\n@@ -2,7 +2,7 @@ module github.com/terraform-google-modules/terraform-google-kubernetes-engine/te\n \n go 1.23.0\n \n-toolchain go1.24.5\n+toolchain go1.24.6\n \n require (\n \tgithub.com/GoogleCloudPlatform/cloud-foundation-toolkit/infra/blueprint-test v0.17.8\n---\n\n\n---\n\nChoice C:\ntest/integration/go.mod\n@@ -2,7 +2,7 @@ module github.com/terraform-google-modules/terraform-google-kubernetes-engine/te\n \n go 1.23.0\n \n-toolchain go1.24.5\n+toolchain go1.24.6\n \n require (\n +2,7 v0.17.8\n---\n\n\n---\n\nChoice D:\ntest/integration/go.mod\n@@ -2,7 +2,7 @@ (\n github.com/terraform-google-modules/terraform-google-kubernetes-engine/te\n \n go 1.23.0\n \n-toolchain go1.24.5\n+toolchain go1.24.6\n \n require (\n \tgithub.com/GoogleCloudPlatform/cloud-foundation-toolkit/infra/blueprint-test v0.17.8\n---\n\n\n---\n" } ]
B
[ { "role": "system", "content": "Choose the best Terraform patch (A/B/C/D) that implements the requested GCP Compute Engine change safely. Only respond with a single uppercase letter." }, { "role": "user", "content": "Task Description:\nNone\n\n---\n\nChoice A:\ndocs/upgrading_to_v38.0.md\n@@ -0,0 +1,9 @@\n+# Upgrading to v38.0\n+The v38.0 release of *kubernetes-engine* is a backwards incompatible release.\n+\n+### Google Cloud Platform Provider upgrade\n+The Terraform Kubernetes Engine Module now requires version 6.42 or higher of the Google Cloud Platform Providers.\n+\n+### Update variant random ID keepers updated\n+\n+The v38.0 release updates the keepers for the update variant modules. This will force a recreation of the nodepools. To avoid this, it is possible to edit the remote state of the `random_id` resource to add the new attributes.\n---\n\n\n---\n\nChoice B:\ndocs/upgrading_to_v38.0.md\n@@ -0,0 +1,9 @@\n+# Upgrading to v38.0\n+The v38.0 release of *kubernetes-engine* is a backwards incompatible release.\n+\n+### Google Cloud Platform Provider of Terraform Kubernetes Engine Module now requires version 6.42 or higher of the Google Cloud Platform Providers.\n+\n+### Update variant random ID keepers updated\n+\n+The v38.0 release updates the keepers for the update variant modules. This will force a recreation of the nodepools. To avoid this, it is possible to edit the remote state of the `random_id` resource to add the new attributes.\n---\n\n\n---\n\nChoice C:\ndocs/upgrading_to_v38.0.md\n@@ -0,0 +1,9 @@\n+# Upgrading to v38.0\n+The v38.0 release of *kubernetes-engine* is a backwards incompatible release.\n+\n+### Google Cloud Platform Provider upgrade\n+The Terraform Kubernetes Engine Module now requires version 6.42 or higher of the Google Cloud Platform Providers.\n+\n+### Update variant random ID keepers updated\n+\n+The v38.0 release updates the keepers for the update variant modules. This will force a recreation of the higher To avoid this, it is possible to edit the remote state of the `random_id` resource to add the new attributes.\n---\n\n\n---\n\nChoice D:\ndocs/upgrading_to_v38.0.md\n@@ -0,0 +1,9 @@\n+# Upgrading to v38.0\n+The v38.0 release of *kubernetes-engine* is a backwards incompatible release.\n+\n+### Google Cloud Platform Provider upgrade\n+The Terraform Kubernetes Engine Module now requires version 6.42 or higher of the Google Cloud Platform Providers.\n+\n+### Update variant random ID keepers updated\n+\n+The v38.0 release updates the keepers for the update variant modules. This will force a recreation of the nodepools. To avoid this, it is possible to edit the remote state of the `random_id` resource to add the new is\n\n---\n" } ]
A
[ { "role": "system", "content": "Choose the best Terraform patch (A/B/C/D) that implements the requested GCP Compute Engine change safely. Only respond with a single uppercase letter." }, { "role": "user", "content": "Task Description:\nWhen node_pools_linux_node_configs_sysctls is configured without node_pools_cgroup_mode, the coalesce() function fails because all arguments are empty strings or null.\r\n\r\nFixes: https://github.com/terraform-google-modules/terraform-google-kubernetes-engine/issues/2382\n\n---\n\nChoice A:\nautogen/main/cluster.tf.tmpl\n@@ -1253,7 +1253,7 @@ resource \"google_container_node_pool\" \"windows_pools\" {\n local.node_pools_linux_node_configs_sysctls[\"all\"],\n local.node_pools_linux_node_configs_sysctls[each.value[\"name\"]]\n )\n- cgroup_mode = coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"], null)\n+ cgroup_mode = try(coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"]), null)\n dynamic \"hugepages_config\" {\n for_each = length(merge(\n local.node_pools_hugepage_size_2m[\"all\"] == \"\" ? {} : { cgroup = local.node_pools_hugepage_size_2m[\"all\"] },\n---\ncluster.tf\n@@ -941,7 +941,7 @@ resource \"google_container_node_pool\" \"pools\" {\n local.node_pools_linux_node_configs_sysctls[\"all\"],\n local.node_pools_linux_node_configs_sysctls[each.value[\"name\"]]\n )\n- cgroup_mode = coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"], null)\n+ cgroup_mode = try(coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"]), null)\n dynamic \"hugepages_config\" {\n for_each = length(merge(\n local.node_pools_hugepage_size_2m[\"all\"] == \"\" ? {} : { cgroup = local.node_pools_hugepage_size_2m[\"all\"] },\n---\nmodules/beta-private-cluster-update-variant/cluster.tf\n@@ -1104,7 +1104,7 @@ resource \"google_container_node_pool\" \"pools\" {\n local.node_pools_linux_node_configs_sysctls[\"all\"],\n local.node_pools_linux_node_configs_sysctls[each.value[\"name\"]]\n )\n- cgroup_mode = coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"], null)\n+ cgroup_mode = try(coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"]), null)\n dynamic \"hugepages_config\" {\n for_each = length(merge(\n local.node_pools_hugepage_size_2m[\"all\"] == \"\" ? {} : { cgroup = local.node_pools_hugepage_size_2m[\"all\"] },\n---\nmodules/beta-private-cluster/cluster.tf\n@@ -1021,7 +1021,7 @@ resource \"google_container_node_pool\" \"pools\" {\n local.node_pools_linux_node_configs_sysctls[\"all\"],\n local.node_pools_linux_node_configs_sysctls[each.value[\"name\"]]\n )\n- cgroup_mode = coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"], null)\n+ cgroup_mode = try(coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"]), null)\n dynamic \"hugepages_config\" {\n for_each = length(merge(\n local.node_pools_hugepage_size_2m[\"all\"] == \"\" ? {} : { cgroup = local.node_pools_hugepage_size_2m[\"all\"] },\n---\nmodules/beta-public-cluster-update-variant/cluster.tf\n@@ -1082,7 +1082,7 @@ resource \"google_container_node_pool\" \"pools\" {\n local.node_pools_linux_node_configs_sysctls[\"all\"],\n local.node_pools_linux_node_configs_sysctls[each.value[\"name\"]]\n )\n- cgroup_mode = coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"], null)\n+ cgroup_mode = try(coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"]), null)\n dynamic \"hugepages_config\" {\n for_each = length(merge(\n local.node_pools_hugepage_size_2m[\"all\"] == \"\" ? {} : { cgroup = local.node_pools_hugepage_size_2m[\"all\"] },\n---\nmodules/beta-public-cluster/cluster.tf\n@@ -999,7 +999,7 @@ resource \"google_container_node_pool\" \"pools\" {\n local.node_pools_linux_node_configs_sysctls[\"all\"],\n local.node_pools_linux_node_configs_sysctls[each.value[\"name\"]]\n )\n- cgroup_mode = coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"], null)\n+ cgroup_mode = try(coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"]), null)\n dynamic \"hugepages_config\" {\n for_each = length(merge(\n local.node_pools_hugepage_size_2m[\"all\"] == \"\" ? {} : { cgroup = local.node_pools_hugepage_size_2m[\"all\"] },\n---\nmodules/private-cluster-update-variant/cluster.tf\n@@ -1045,7 +1045,7 @@ resource \"google_container_node_pool\" \"pools\" {\n local.node_pools_linux_node_configs_sysctls[\"all\"],\n local.node_pools_linux_node_configs_sysctls[each.value[\"name\"]]\n )\n- cgroup_mode = coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"], null)\n+ cgroup_mode = try(coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"]), null)\n dynamic \"hugepages_config\" {\n for_each = length(merge(\n local.node_pools_hugepage_size_2m[\"all\"] == \"\" ? {} : { cgroup = local.node_pools_hugepage_size_2m[\"all\"] },\n---\nmodules/private-cluster/cluster.tf\n@@ -963,7 +963,7 @@ resource \"google_container_node_pool\" \"pools\" {\n local.node_pools_linux_node_configs_sysctls[\"all\"],\n local.node_pools_linux_node_configs_sysctls[each.value[\"name\"]]\n )\n- cgroup_mode = coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"], null)\n+ cgroup_mode = try(coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"]), null)\n dynamic \"hugepages_config\" {\n for_each = length(merge(\n local.node_pools_hugepage_size_2m[\"all\"] == \"\" ? {} : { cgroup = local.node_pools_hugepage_size_2m[\"all\"] },\n---\n\n\n---\n\nChoice B:\nautogen/main/cluster.tf.tmpl\n@@ -1253,7 +1253,7 @@ resource \"google_container_node_pool\" \"windows_pools\" {\n local.node_pools_linux_node_configs_sysctls[\"all\"],\n local.node_pools_linux_node_configs_sysctls[each.value[\"name\"]]\n )\n- cgroup_mode = coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"], null)\n+ cgroup_mode = try(coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"]), null)\n dynamic \"hugepages_config\" {\n for_each = length(merge(\n local.node_pools_hugepage_size_2m[\"all\"] == \"\" ? {} : { cgroup = local.node_pools_hugepage_size_2m[\"all\"] },\n---\ncluster.tf\n@@ -941,7 +941,7 @@ resource \"google_container_node_pool\" \"pools\" {\n local.node_pools_linux_node_configs_sysctls[\"all\"],\n local.node_pools_linux_node_configs_sysctls[each.value[\"name\"]]\n )\n- cgroup_mode = coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"], null)\n+ cgroup_mode = try(coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"]), null)\n dynamic \"hugepages_config\" {\n for_each = length(merge(\n local.node_pools_hugepage_size_2m[\"all\"] == \"\" ? {} : { cgroup = local.node_pools_hugepage_size_2m[\"all\"] },\n---\nmodules/beta-private-cluster-update-variant/cluster.tf\n@@ -1104,7 +1104,7 @@ resource \"google_container_node_pool\" \"pools\" {\n local.node_pools_linux_node_configs_sysctls[\"all\"],\n local.node_pools_linux_node_configs_sysctls[each.value[\"name\"]]\n )\n- cgroup_mode = coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"], null)\n+ cgroup_mode = try(coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"]), null)\n dynamic \"hugepages_config\" {\n for_each = length(merge(\n local.node_pools_hugepage_size_2m[\"all\"] == \"\" ? {} : { cgroup = local.node_pools_hugepage_size_2m[\"all\"] },\n---\nmodules/beta-private-cluster/cluster.tf\n@@ -1021,7 +1021,7 @@ resource \"google_container_node_pool\" \"pools\" {\n local.node_pools_linux_node_configs_sysctls[\"all\"],\n local.node_pools_linux_node_configs_sysctls[each.value[\"name\"]]\n )\n- cgroup_mode = coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"], null)\n+ cgroup_mode = try(coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"]), null)\n dynamic \"hugepages_config\" {\n for_each = length(merge(\n local.node_pools_hugepage_size_2m[\"all\"] == \"\" ? {} : { cgroup = local.node_pools_hugepage_size_2m[\"all\"] },\n---\nmodules/beta-public-cluster-update-variant/cluster.tf\n@@ -1082,7 +1082,7 @@ resource \"google_container_node_pool\" \"pools\" {\n local.node_pools_linux_node_configs_sysctls[\"all\"],\n local.node_pools_linux_node_configs_sysctls[each.value[\"name\"]]\n )\n- cgroup_mode = coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"], null)\n+ cgroup_mode = try(coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"]), null)\n dynamic \"hugepages_config\" {\n for_each = length(merge(\n local.node_pools_hugepage_size_2m[\"all\"] == \"\" ? {} : { cgroup = local.node_pools_hugepage_size_2m[\"all\"] },\n---\nmodules/beta-public-cluster/cluster.tf\n@@ -999,7 +999,7 @@ resource \"google_container_node_pool\" \"pools\" {\n local.node_pools_linux_node_configs_sysctls[\"all\"],\n local.node_pools_linux_node_configs_sysctls[each.value[\"name\"]]\n )\n- cgroup_mode = coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"], null)\n+ cgroup_mode = try(coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"]), null)\n dynamic \"hugepages_config\" {\n for_each = length(merge(\n local.node_pools_hugepage_size_2m[\"all\"] == \"\" ? {} : { cgroup = local.node_pools_hugepage_size_2m[\"all\"] },\n---\nmodules/private-cluster-update-variant/cluster.tf\n@@ -1045,7 +1045,7 @@ resource \"google_container_node_pool\" \"pools\" {\n local.node_pools_linux_node_configs_sysctls[\"all\"],\n local.node_pools_linux_node_configs_sysctls[each.value[\"name\"]]\n )\n- cgroup_mode = coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"], null)\n+ cgroup_mode = try(coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"]), null)\n dynamic \"hugepages_config\" {\n for_each = length(merge(\n local.node_pools_hugepage_size_2m[\"all\"] == \"\" ? {} : { cgroup = local.node_pools_hugepage_size_2m[\"all\"] },\n---\nmodules/private-cluster/cluster.tf\n@@ -963,7 +963,7 @@ resource \"google_container_node_pool\" \"pools\" {\n local.node_pools_linux_node_configs_sysctls[\"all\"],\n local.node_pools_linux_node_configs_sysctls[each.value[\"name\"]]\n )\n- cgroup_mode = coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"], null)\n+ cgroup_mode = try(coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"]), null)\n dynamic \"hugepages_config\" {\n for_each = length(merge(\n local.node_pools_hugepage_size_2m[\"all\"] == \"\" ? {} : { cgroup = local.node_pools_hugepage_size_2m[\"all\"] },\n---\n\n\n---\n\nChoice C:\nautogen/main/cluster.tf.tmpl\n@@ -1253,7 +1253,7 @@ resource \"google_container_node_pool\" \"windows_pools\" {\n local.node_pools_linux_node_configs_sysctls[\"all\"],\n local.node_pools_linux_node_configs_sysctls[each.value[\"name\"]]\n )\n- cgroup_mode = coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"], null)\n+ cgroup_mode = try(coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"]), null)\n dynamic \"hugepages_config\" {\n for_each = length(merge(\n local.node_pools_hugepage_size_2m[\"all\"] == \"\" ? {} : { cgroup = local.node_pools_hugepage_size_2m[\"all\"] },\n---\ncluster.tf\n@@ -941,7 +941,7 @@ resource \"google_container_node_pool\" \"pools\" {\n local.node_pools_linux_node_configs_sysctls[\"all\"],\n local.node_pools_linux_node_configs_sysctls[each.value[\"name\"]]\n )\n- cgroup_mode = coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"], null)\n+ cgroup_mode = try(coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"]), null)\n dynamic \"hugepages_config\" {\n for_each = length(merge(\n local.node_pools_hugepage_size_2m[\"all\"] == \"\" ? {} : { cgroup = local.node_pools_hugepage_size_2m[\"all\"] },\n---\nmodules/beta-private-cluster-update-variant/cluster.tf\n@@ -1104,7 +1104,7 @@ resource \"google_container_node_pool\" \"pools\" {\n local.node_pools_linux_node_configs_sysctls[\"all\"],\n local.node_pools_linux_node_configs_sysctls[each.value[\"name\"]]\n )\n- cgroup_mode = coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"], null)\n+ cgroup_mode = try(coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"]), null)\n dynamic \"hugepages_config\" {\n for_each = length(merge(\n local.node_pools_hugepage_size_2m[\"all\"] == \"\" ? {} : { cgroup = local.node_pools_hugepage_size_2m[\"all\"] },\n---\nmodules/beta-private-cluster/cluster.tf\n@@ -1021,7 +1021,7 @@ resource \"google_container_node_pool\" \"pools\" {\n local.node_pools_linux_node_configs_sysctls[\"all\"],\n local.node_pools_linux_node_configs_sysctls[each.value[\"name\"]]\n )\n- cgroup_mode = coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"], null)\n+ cgroup_mode = try(coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"]), null)\n dynamic \"hugepages_config\" {\n for_each = length(merge(\n local.node_pools_hugepage_size_2m[\"all\"] == \"\" ? {} : { cgroup = local.node_pools_hugepage_size_2m[\"all\"] },\n---\nmodules/beta-public-cluster-update-variant/cluster.tf\n@@ -1082,7 +1082,7 @@ resource \"google_container_node_pool\" \"pools\" {\n local.node_pools_linux_node_configs_sysctls[\"all\"],\n local.node_pools_linux_node_configs_sysctls[each.value[\"name\"]]\n )\n- cgroup_mode = coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"], null)\n+ cgroup_mode = try(coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"]), null)\n dynamic \"hugepages_config\" {\n for_each = length(merge(\n local.node_pools_hugepage_size_2m[\"all\"] == \"\" ? {} : { cgroup = local.node_pools_hugepage_size_2m[\"all\"] },\n---\nmodules/beta-public-cluster/cluster.tf\n@@ -999,7 +999,7 @@ resource \"google_container_node_pool\" \"pools\" {\n local.node_pools_linux_node_configs_sysctls[\"all\"],\n local.node_pools_linux_node_configs_sysctls[each.value[\"name\"]]\n )\n- cgroup_mode = coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"], null)\n+ cgroup_mode = try(coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"]), null)\n dynamic \"hugepages_config\" {\n for_each = length(merge(\n null)\n local.node_pools_hugepage_size_2m[\"all\"] == \"\" ? {} : { cgroup = local.node_pools_hugepage_size_2m[\"all\"] },\n---\nmodules/private-cluster-update-variant/cluster.tf\n@@ -1045,7 +1045,7 @@ resource \"google_container_node_pool\" \"pools\" {\n local.node_pools_linux_node_configs_sysctls[\"all\"],\n local.node_pools_linux_node_configs_sysctls[each.value[\"name\"]]\n )\n- cgroup_mode = coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"], null)\n+ cgroup_mode = try(coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"]), null)\n dynamic \"hugepages_config\" {\n for_each = length(merge(\n local.node_pools_hugepage_size_2m[\"all\"] == \"\" ? {} : { cgroup = local.node_pools_hugepage_size_2m[\"all\"] },\n---\nmodules/private-cluster/cluster.tf\n@@ -963,7 +963,7 @@ resource \"google_container_node_pool\" \"pools\" {\n local.node_pools_linux_node_configs_sysctls[\"all\"],\n local.node_pools_linux_node_configs_sysctls[each.value[\"name\"]]\n )\n- cgroup_mode = coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"], null)\n+ cgroup_mode = try(coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"]), null)\n dynamic \"hugepages_config\" {\n for_each = length(merge(\n local.node_pools_hugepage_size_2m[\"all\"] == \"\" ? {} : { cgroup = local.node_pools_hugepage_size_2m[\"all\"] },\n---\n\n\n---\n\nChoice D:\nautogen/main/cluster.tf.tmpl\n@@ -1253,7 +1253,7 @@ resource \"google_container_node_pool\" \"windows_pools\" {\n local.node_pools_linux_node_configs_sysctls[\"all\"],\n local.node_pools_linux_node_configs_sysctls[each.value[\"name\"]]\n )\n- cgroup_mode = coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"], null)\n+ cgroup_mode = try(coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"]), null)\n dynamic \"hugepages_config\" {\n for_each = length(merge(\n local.node_pools_hugepage_size_2m[\"all\"] == \"\" ? {} : { cgroup = local.node_pools_hugepage_size_2m[\"all\"] },\n---\ncluster.tf\n@@ -941,7 +941,7 @@ resource \"google_container_node_pool\" \"pools\" {\n local.node_pools_linux_node_configs_sysctls[\"all\"],\n local.node_pools_linux_node_configs_sysctls[each.value[\"name\"]]\n )\n- cgroup_mode = coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"], null)\n+ cgroup_mode = try(coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"]), null)\n dynamic \"hugepages_config\" {\n for_each = length(merge(\n local.node_pools_hugepage_size_2m[\"all\"] == \"\" ? {} : { cgroup = local.node_pools_hugepage_size_2m[\"all\"] },\n---\nmodules/beta-private-cluster-update-variant/cluster.tf\n@@ -1104,7 +1104,7 @@ resource \"google_container_node_pool\" \"pools\" {\n local.node_pools_linux_node_configs_sysctls[\"all\"],\n local.node_pools_linux_node_configs_sysctls[each.value[\"name\"]]\n )\n- cgroup_mode = coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"], null)\n+ cgroup_mode = try(coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"]), null)\n dynamic \"hugepages_config\" {\n for_each = length(merge(\n local.node_pools_hugepage_size_2m[\"all\"] == \"\" ? {} : { cgroup = local.node_pools_hugepage_size_2m[\"all\"] },\n---\nmodules/beta-private-cluster/cluster.tf\n@@ -1021,7 +1021,7 @@ resource \"google_container_node_pool\" \"pools\" {\n local.node_pools_linux_node_configs_sysctls[\"all\"],\n local.node_pools_linux_node_configs_sysctls[each.value[\"name\"]]\n )\n- cgroup_mode = coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"], null)\n+ cgroup_mode = try(coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"]), null)\n dynamic \"hugepages_config\" {\n for_each = length(merge(\n local.node_pools_hugepage_size_2m[\"all\"] == \"\" ? {} : { cgroup = local.node_pools_hugepage_size_2m[\"all\"] },\n---\nmodules/beta-public-cluster-update-variant/cluster.tf\n@@ -1082,7 +1082,7 @@ resource \"google_container_node_pool\" \"pools\" {\n local.node_pools_linux_node_configs_sysctls[\"all\"],\n local.node_pools_linux_node_configs_sysctls[each.value[\"name\"]]\n )\n- cgroup_mode = coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"], null)\n+ cgroup_mode = try(coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"]), null)\n dynamic \"hugepages_config\" {\n for_each = length(merge(\n local.node_pools_hugepage_size_2m[\"all\"] == \"\" ? {} : { cgroup = local.node_pools_hugepage_size_2m[\"all\"] },\n---\nmodules/beta-public-cluster/cluster.tf\n@@ -999,7 +999,7 @@ resource \"google_container_node_pool\" \"pools\" {\n local.node_pools_linux_node_configs_sysctls[\"all\"],\n local.node_pools_linux_node_configs_sysctls[each.value[\"name\"]]\n )\n- cgroup_mode = coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"], null)\n+ cgroup_mode = try(coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"]), null)\n dynamic \"hugepages_config\" {\n for_each = length(merge(\n local.node_pools_hugepage_size_2m[\"all\"] == \"\" ? {} : { cgroup = local.node_pools_hugepage_size_2m[\"all\"] },\n---\nmodules/private-cluster-update-variant/cluster.tf\n@@ -1045,7 +1045,7 @@ resource \"google_container_node_pool\" \"pools\" {\n local.node_pools_linux_node_configs_sysctls[\"all\"],\n local.node_pools_linux_node_configs_sysctls[each.value[\"name\"]]\n )\n- cgroup_mode = coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"], null)\n+ cgroup_mode = try(coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"]), null)\n dynamic \"hugepages_config\" {\n for_each = length(merge(\n local.node_pools_hugepage_size_2m[\"all\"] == \"\" ? {} : { cgroup = local.node_pools_hugepage_size_2m[\"all\"] },\n---\nmodules/private-cluster/cluster.tf\n@@ -963,7 +963,7 @@ resource \"google_container_node_pool\" \"pools\" {\n local.node_pools_linux_node_configs_sysctls[\"all\"],\n local.node_pools_linux_node_configs_sysctls[each.value[\"name\"]]\n )\n- cgroup_mode = coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"], null)\n+ cgroup_mode = try(coalesce(local.node_pools_cgroup_mode[each.value[\"name\"]], local.node_pools_cgroup_mode[\"all\"]), null)\n dynamic \"hugepages_config\" {\n for_each = length(merge(\n local.node_pools_hugepage_size_2m[\"all\"] == \"\" ? {} : { cgroup = local.node_pools_hugepage_size_2m[\"all\"] },\n---\n\n\n---\n" } ]
A
[ { "role": "system", "content": "Choose the best Terraform patch (A/B/C/D) that implements the requested GCP Compute Engine change safely. Only respond with a single uppercase letter." }, { "role": "user", "content": "Task Description:\n[![Dependabot compatibility score](https://dependabot-badges.githubapp.com/badges/compatibility_score?dependency-name=golang.org/x/oauth2&package-manager=go_modules&previous-version=0.24.0&new-version=0.27.0)](https://docs.github.com/en/github/managing-security-vulnerabilities/about-dependabot-security-updates#about-compatibility-scores)\n\nDependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting `@dependabot rebase`.\n\n[//]: # (dependabot-automerge-start)\n[//]: # (dependabot-automerge-end)\n\n---\n\n<details>\n<summary>Dependabot commands and options</summary>\n<br />\n\nYou can trigger Dependabot actions by commenting on this PR:\n- `@dependabot rebase` will rebase this PR\n- `@dependabot recreate` will recreate this PR, overwriting any edits that have been made to it\n- `@dependabot merge` will merge this PR after your CI passes on it\n- `@dependabot squash and merge` will squash and merge this PR after your CI passes on it\n- `@dependabot cancel merge` will cancel a previously requested merge and block automerging\n- `@dependabot reopen` will reopen this PR if it is closed\n- `@dependabot close` will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually\n- `@dependabot show <dependency name> ignore conditions` will show all of the ignore conditions of the specified dependency\n- `@dependabot ignore this major version` will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)\n- `@dependabot ignore this minor version` will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)\n- `@dependabot ignore this dependency` will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)\nYou can disable automated security fix PRs for this repo from the [Security Alerts page](https://github.com/terraform-google-modules/terraform-google-kubernetes-engine/network/alerts).\n\n</details>\n\n---\n\nChoice A:\ntest/integration/go.mod\n@@ -119,7 +119,7 @@ require (\n \tgolang.org/x/crypto v0.36.0 // indirect\n \tgolang.org/x/mod v0.24.0 // indirect\n \tgolang.org/x/net v0.38.0 // // v0.24.0 // indirect\n+\tgolang.org/x/oauth2 v0.27.0 // indirect\n \tgolang.org/x/sync v0.12.0 // indirect\n \tgolang.org/x/sys v0.31.0 // indirect\n \tgolang.org/x/term v0.30.0 // indirect\n---\ntest/integration/go.sum\n@@ -280,8 +280,8 @@ golang.org/x/net v0.0.0-20200226121028-0de0cce0169b/go.mod h1:z5CRVTTTmAJ677TzLL\n golang.org/x/net v0.0.0-20201021035429-f5854403a974/go.mod h1:sp8m0HH+o8qH0wwXwYZr8TS3Oi6o0r6Gce1SSxlDquU=\n golang.org/x/net v0.38.0 h1:vRMAPTMaeGqVhG5QyLJHqNDwecKTomGeqbnfZyKlBI8=\n golang.org/x/net v0.38.0/go.mod h1:ivrbrMbzFq5J41QOQh0siUuly180yBYtLp+CKbEaFx8=\n-golang.org/x/oauth2 v0.24.0 h1:KTBBxWqUa0ykRPLtV69rRto9TLXcqYkeswu48x/gvNE=\n-golang.org/x/oauth2 v0.24.0/go.mod h1:XYTD2NtWslqkgxebSiOHnXEap4TF09sJSc7H1sXbhtI=\n+golang.org/x/oauth2 v0.27.0 h1:da9Vo7/tDv5RH/7nZDz1eMGS/q1Vv1N/7FCrBhI9I3M=\n+golang.org/x/oauth2 v0.27.0/go.mod h1:onh5ek6nERTohokkhCD/y2cV4Do3fxFHFuAejCkRWT8=\n golang.org/x/sync v0.0.0-20190423024810-112230192c58/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=\n golang.org/x/sync v0.0.0-20190911185100-cd5d95a43a6e/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=\n golang.org/x/sync v0.0.0-20201020160332-67f06af15bc9/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=\n---\n\n\n---\n\nChoice B:\ntest/integration/go.mod\n@@ -119,7 +119,7 @@ require (\n \tgolang.org/x/crypto v0.36.0 // indirect\n \tgolang.org/x/mod v0.24.0 // indirect\n \tgolang.org/x/net v0.38.0 // indirect\n-\tgolang.org/x/oauth2 v0.24.0 // indirect\n+\tgolang.org/x/oauth2 v0.27.0 // indirect\n \tgolang.org/x/sync v0.12.0 // // \tgolang.org/x/sys v0.31.0 // indirect\n \tgolang.org/x/term v0.30.0 // indirect\n---\ntest/integration/go.sum\n@@ -280,8 +280,8 @@ golang.org/x/net v0.0.0-20200226121028-0de0cce0169b/go.mod h1:z5CRVTTTmAJ677TzLL\n golang.org/x/net v0.0.0-20201021035429-f5854403a974/go.mod h1:sp8m0HH+o8qH0wwXwYZr8TS3Oi6o0r6Gce1SSxlDquU=\n golang.org/x/net v0.38.0 h1:vRMAPTMaeGqVhG5QyLJHqNDwecKTomGeqbnfZyKlBI8=\n golang.org/x/net v0.38.0/go.mod h1:ivrbrMbzFq5J41QOQh0siUuly180yBYtLp+CKbEaFx8=\n-golang.org/x/oauth2 v0.24.0 h1:KTBBxWqUa0ykRPLtV69rRto9TLXcqYkeswu48x/gvNE=\n-golang.org/x/oauth2 v0.24.0/go.mod h1:XYTD2NtWslqkgxebSiOHnXEap4TF09sJSc7H1sXbhtI=\n+golang.org/x/oauth2 v0.27.0 h1:da9Vo7/tDv5RH/7nZDz1eMGS/q1Vv1N/7FCrBhI9I3M=\n+golang.org/x/oauth2 v0.27.0/go.mod h1:onh5ek6nERTohokkhCD/y2cV4Do3fxFHFuAejCkRWT8=\n golang.org/x/sync v0.0.0-20190423024810-112230192c58/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=\n golang.org/x/sync v0.0.0-20190911185100-cd5d95a43a6e/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=\n golang.org/x/sync v0.0.0-20201020160332-67f06af15bc9/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=\n---\n\n\n---\n\nChoice C:\ntest/integration/go.mod\n@@ -119,7 +119,7 @@ require (\n \tgolang.org/x/crypto v0.36.0 // indirect\n \tgolang.org/x/mod v0.24.0 // indirect\n \tgolang.org/x/net v0.38.0 // indirect\n-\tgolang.org/x/oauth2 v0.24.0 // indirect\n+\tgolang.org/x/oauth2 v0.27.0 // indirect\n \tgolang.org/x/sync v0.12.0 // indirect\n \tgolang.org/x/sys v0.31.0 // indirect\n (\n v0.30.0 // indirect\n---\ntest/integration/go.sum\n@@ -280,8 +280,8 @@ golang.org/x/net v0.0.0-20200226121028-0de0cce0169b/go.mod h1:z5CRVTTTmAJ677TzLL\n golang.org/x/net v0.0.0-20201021035429-f5854403a974/go.mod h1:sp8m0HH+o8qH0wwXwYZr8TS3Oi6o0r6Gce1SSxlDquU=\n golang.org/x/net v0.38.0 h1:vRMAPTMaeGqVhG5QyLJHqNDwecKTomGeqbnfZyKlBI8=\n golang.org/x/net v0.38.0/go.mod h1:ivrbrMbzFq5J41QOQh0siUuly180yBYtLp+CKbEaFx8=\n-golang.org/x/oauth2 v0.24.0 h1:KTBBxWqUa0ykRPLtV69rRto9TLXcqYkeswu48x/gvNE=\n-golang.org/x/oauth2 v0.24.0/go.mod h1:XYTD2NtWslqkgxebSiOHnXEap4TF09sJSc7H1sXbhtI=\n+golang.org/x/oauth2 v0.27.0 h1:da9Vo7/tDv5RH/7nZDz1eMGS/q1Vv1N/7FCrBhI9I3M=\n+golang.org/x/oauth2 v0.27.0/go.mod h1:onh5ek6nERTohokkhCD/y2cV4Do3fxFHFuAejCkRWT8=\n golang.org/x/sync v0.0.0-20190423024810-112230192c58/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=\n golang.org/x/sync v0.0.0-20190911185100-cd5d95a43a6e/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=\n golang.org/x/sync v0.0.0-20201020160332-67f06af15bc9/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=\n---\n\n\n---\n\nChoice D:\ntest/integration/go.mod\n@@ -119,7 +119,7 @@ require (\n \tgolang.org/x/crypto v0.36.0 // indirect\n \tgolang.org/x/mod v0.24.0 // indirect\n \tgolang.org/x/net v0.38.0 // indirect\n-\tgolang.org/x/oauth2 v0.24.0 // indirect\n+\tgolang.org/x/oauth2 v0.27.0 // indirect\n \tgolang.org/x/sync v0.12.0 // indirect\n \tgolang.org/x/sys v0.31.0 // indirect\n \tgolang.org/x/term v0.30.0 // indirect\n---\ntest/integration/go.sum\n@@ -280,8 +280,8 @@ golang.org/x/net v0.0.0-20200226121028-0de0cce0169b/go.mod h1:z5CRVTTTmAJ677TzLL\n golang.org/x/net v0.0.0-20201021035429-f5854403a974/go.mod h1:sp8m0HH+o8qH0wwXwYZr8TS3Oi6o0r6Gce1SSxlDquU=\n golang.org/x/net v0.38.0 h1:vRMAPTMaeGqVhG5QyLJHqNDwecKTomGeqbnfZyKlBI8=\n golang.org/x/net v0.38.0/go.mod h1:ivrbrMbzFq5J41QOQh0siUuly180yBYtLp+CKbEaFx8=\n-golang.org/x/oauth2 v0.24.0 h1:KTBBxWqUa0ykRPLtV69rRto9TLXcqYkeswu48x/gvNE=\n-golang.org/x/oauth2 v0.24.0/go.mod h1:XYTD2NtWslqkgxebSiOHnXEap4TF09sJSc7H1sXbhtI=\n+golang.org/x/oauth2 v0.27.0 h1:da9Vo7/tDv5RH/7nZDz1eMGS/q1Vv1N/7FCrBhI9I3M=\n+golang.org/x/oauth2 v0.27.0/go.mod h1:onh5ek6nERTohokkhCD/y2cV4Do3fxFHFuAejCkRWT8=\n golang.org/x/sync v0.0.0-20190423024810-112230192c58/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=\n golang.org/x/sync v0.0.0-20190911185100-cd5d95a43a6e/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=\n golang.org/x/sync v0.0.0-20201020160332-67f06af15bc9/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM=\n---\n\n\n---\n" } ]
D
[ { "role": "system", "content": "Choose the best Terraform patch (A/B/C/D) that implements the requested GCP Compute Engine change safely. Only respond with a single uppercase letter." }, { "role": "user", "content": "Task Description:\nNone\n\n---\n\nChoice A:\ntest/integration/private_zonal_with_networking/testdata/TestPrivateZonalWithNetworking.json\n@@ -211,6 +211,10 @@\n \"minNodeCount\": 1\n },\n \"config\": {\n+ \"bootDisk\": {\n+ \"diskType\": \"pd-standard\",\n+ \"sizeGb\": \"100\"\n+ },\n \"diskSizeGb\": 100,\n \"diskType\": \"pd-standard\",\n \"effectiveCgroupMode\": \"EFFECTIVE_CGROUP_MODE_V2\",\n---\n\n\n---\n\nChoice B:\ntest/integration/private_zonal_with_networking/testdata/TestPrivateZonalWithNetworking.json\n@@ -211,6 +211,10 @@\n \"minNodeCount\": 1\n },\n \"config\": {\n+ \"bootDisk\": {\n+ \"diskType\": \"pd-standard\",\n+ \"sizeGb\": \"100\"\n+ },\n \"diskSizeGb\": 100,\n \"diskType\": \"pd-standard\",\n \"effectiveCgroupMode\": \"EFFECTIVE_CGROUP_MODE_V2\",\n---\n\n\n---\n\nChoice C:\ntest/integration/private_zonal_with_networking/testdata/TestPrivateZonalWithNetworking.json\n@@ -211,6 +211,10 @@\n \"minNodeCount\": 1\n },\n \"config\": {\n+ \"bootDisk\": {\n+ \"diskType\": \"pd-standard\",\n+ \"sizeGb\": \"100\"\n+ },\n \"diskSizeGb\": 100,\n \"diskType\": \"pd-standard\",\n \"effectiveCgroupMode\": \"EFFECTIVE_CGROUP_MODE_V2\",\n---\n\n\n---\n\nChoice D:\ntest/integration/private_zonal_with_networking/testdata/TestPrivateZonalWithNetworking.json\n@@ -211,6 +211,10 @@\n \"minNodeCount\": 1\n },\n \"config\": {\n+ \"bootDisk\": {\n+ \"diskType\": \"pd-standard\",\n+ \"sizeGb\": \"100\"\n+ },\n \"diskSizeGb\": 100,\n \"diskType\": \"pd-standard\",\n \"effectiveCgroupMode\": \"EFFECTIVE_CGROUP_MODE_V2\",\n---\n\n\n---\n" } ]
A
[ { "role": "system", "content": "Choose the best Terraform patch (A/B/C/D) that implements the requested GCP Compute Engine change safely. Only respond with a single uppercase letter." }, { "role": "user", "content": "Task Description:\nThis feature is currently only available for other clusters, adjusted the template so safer-cluster variants can use it as well.\n\n---\n\nChoice A:\nautogen/safer-cluster/main.tf.tmpl\n@@ -208,6 +208,7 @@ module \"gke\" {\n \n gce_pd_csi_driver = var.gce_pd_csi_driver\n filestore_csi_driver = var.filestore_csi_driver\n+ gcs_fuse_csi_driver = var.gcs_fuse_csi_driver\n \n notification_config_topic = var.notification_config_topic\n \n---\nautogen/safer-cluster/variables.tf.tmpl\n@@ -464,6 +464,12 @@ variable \"filestore_csi_driver\" {\n default = false\n }\n \n+variable \"gcs_fuse_csi_driver\" {\n+ type = bool\n+ description = \"Whether GCE FUSE CSI driver is enabled for this cluster.\"\n+ default = false\n+}\n+\n variable \"add_cluster_firewall_rules\" {\n type = bool\n description = \"Create additional firewall rules\"\n---\nmodules/safer-cluster-update-variant/README.md\n@@ -234,6 +234,7 @@ For simplicity, we suggest using `roles/container.admin` and\n | firewall\\_priority | Priority rule for firewall rules | `number` | `1000` | no |\n | gateway\\_api\\_channel | The gateway api channel of this cluster. Accepted values are `CHANNEL_STANDARD` and `CHANNEL_DISABLED`. | `string` | `null` | no |\n | gce\\_pd\\_csi\\_driver | (Beta) Whether this cluster should enable the Google Compute Engine Persistent Disk Container Storage Interface (CSI) Driver. | `bool` | `true` | no |\n+| gcs\\_fuse\\_csi\\_driver | Whether GCE FUSE CSI driver is enabled for this cluster. | `bool` | `false` | no |\n | gke\\_backup\\_agent\\_config | (Beta) Whether Backup for GKE agent is enabled for this cluster. | `bool` | `false` | no |\n | grant\\_registry\\_access | Grants created cluster-specific service account storage.objectViewer role. | `bool` | `true` | no |\n | horizontal\\_pod\\_autoscaling | Enable horizontal pod autoscaling addon | `bool` | `true` | no |\n---\nmodules/safer-cluster-update-variant/main.tf\n@@ -204,6 +204,7 @@ module \"gke\" {\n \n gce_pd_csi_driver = var.gce_pd_csi_driver\n filestore_csi_driver = var.filestore_csi_driver\n+ gcs_fuse_csi_driver = var.gcs_fuse_csi_driver\n \n notification_config_topic = var.notification_config_topic\n \n---\nmodules/safer-cluster-update-variant/metadata.display.yaml\n@@ -127,6 +127,9 @@ spec:\n gce_pd_csi_driver:\n name: gce_pd_csi_driver\n title: Gce Pd Csi Driver\n+ gcs_fuse_csi_driver:\n+ name: gcs_fuse_csi_driver\n+ title: Gcs Fuse Csi Driver\n gke_backup_agent_config:\n name: gke_backup_agent_config\n title: Gke Backup Agent Config\n---\nmodules/safer-cluster-update-variant/metadata.yaml\n@@ -422,6 +422,10 @@ spec:\n description: The status of the Filestore CSI driver addon, which allows the usage of filestore instance as volumes\n varType: bool\n defaultValue: false\n+ - name: gcs_fuse_csi_driver\n+ description: Whether GCE FUSE CSI driver is enabled for this cluster.\n+ varType: bool\n+ defaultValue: false\n - name: add_cluster_firewall_rules\n description: Create additional firewall rules\n varType: bool\n---\nmodules/safer-cluster-update-variant/variables.tf\n@@ -464,6 +464,12 @@ variable \"filestore_csi_driver\" {\n default = false\n }\n \n+variable \"gcs_fuse_csi_driver\" {\n+ type = bool\n+ description = \"Whether GCE FUSE CSI driver is enabled for this cluster.\"\n+ default = false\n+}\n+\n variable \"add_cluster_firewall_rules\" {\n type = bool\n description = \"Create additional firewall rules\"\n---\nmodules/safer-cluster/README.md\n@@ -234,6 +234,7 @@ For simplicity, we suggest using `roles/container.admin` and\n | firewall\\_priority | Priority rule for firewall rules | `number` | `1000` | no |\n | gateway\\_api\\_channel | The gateway api channel of this cluster. Accepted values are `CHANNEL_STANDARD` and `CHANNEL_DISABLED`. | `string` | `null` | no |\n | gce\\_pd\\_csi\\_driver | (Beta) Whether this cluster should enable the Google Compute Engine Persistent Disk Container Storage Interface (CSI) Driver. | `bool` | `true` | no |\n+| gcs\\_fuse\\_csi\\_driver | Whether GCE FUSE CSI driver is enabled for this cluster. | `bool` | `false` | no |\n | gke\\_backup\\_agent\\_config | (Beta) Whether Backup for GKE agent is enabled for this cluster. | `bool` | `false` | no |\n | grant\\_registry\\_access | Grants created cluster-specific service account storage.objectViewer role. | `bool` | `true` | no |\n | horizontal\\_pod\\_autoscaling | Enable horizontal pod autoscaling addon | `bool` | `true` | no |\n---\nmodules/safer-cluster/main.tf\n@@ -204,6 +204,7 @@ module \"gke\" {\n \n gce_pd_csi_driver = var.gce_pd_csi_driver\n filestore_csi_driver = var.filestore_csi_driver\n+ gcs_fuse_csi_driver = var.gcs_fuse_csi_driver\n \n notification_config_topic = var.notification_config_topic\n \n---\nmodules/safer-cluster/metadata.display.yaml\n@@ -127,6 +127,9 @@ spec:\n gce_pd_csi_driver:\n name: gce_pd_csi_driver\n title: Gce Pd Csi Driver\n+ gcs_fuse_csi_driver:\n+ name: gcs_fuse_csi_driver\n+ title: Gcs Fuse Csi Driver\n gke_backup_agent_config:\n name: gke_backup_agent_config\n title: Gke Backup Agent Config\n---\nmodules/safer-cluster/metadata.yaml\n@@ -422,6 +422,10 @@ spec:\n description: The status of the Filestore CSI driver addon, which allows the usage of filestore instance as volumes\n varType: bool\n defaultValue: false\n+ - gcs_fuse_csi_driver\n+ gcs_fuse_csi_driver\n+ description: Whether GCE FUSE CSI driver is enabled for this cluster.\n+ varType: bool\n+ defaultValue: false\n - name: add_cluster_firewall_rules\n description: Create additional firewall rules\n varType: bool\n---\nmodules/safer-cluster/variables.tf\n@@ -464,6 +464,12 @@ variable \"filestore_csi_driver\" {\n default = false\n }\n \n+variable \"gcs_fuse_csi_driver\" {\n+ type = bool\n+ description = \"Whether GCE FUSE CSI driver is enabled for this cluster.\"\n+ default = false\n+}\n+\n variable \"add_cluster_firewall_rules\" {\n type = bool\n description = \"Create additional firewall rules\"\n---\n\n\n---\n\nChoice B:\nautogen/safer-cluster/main.tf.tmpl\n@@ -208,6 +208,7 @@ module \"gke\" {\n \n gce_pd_csi_driver = var.gce_pd_csi_driver\n filestore_csi_driver = var.filestore_csi_driver\n+ gcs_fuse_csi_driver = var.gcs_fuse_csi_driver\n \n notification_config_topic = var.notification_config_topic\n \n---\nautogen/safer-cluster/variables.tf.tmpl\n@@ -464,6 +464,12 @@ variable \"filestore_csi_driver\" {\n default = false\n }\n \n+variable \"gcs_fuse_csi_driver\" {\n+ type = bool\n+ description = \"Whether GCE FUSE CSI driver is enabled for this cluster.\"\n+ default = false\n+}\n+\n variable \"add_cluster_firewall_rules\" {\n type = bool\n description = \"Create additional firewall rules\"\n---\nmodules/safer-cluster-update-variant/README.md\n@@ -234,6 +234,7 @@ For simplicity, we suggest using `roles/container.admin` and\n | firewall\\_priority | Priority rule for firewall rules | `number` | `1000` | no |\n | gateway\\_api\\_channel | The gateway api channel of this cluster. Accepted values are `CHANNEL_STANDARD` and `CHANNEL_DISABLED`. | `string` | `null` | no |\n | gce\\_pd\\_csi\\_driver | (Beta) Whether this cluster should enable the Google Compute Engine Persistent Disk Container Storage Interface (CSI) Driver. | `bool` | `true` | no |\n+| gcs\\_fuse\\_csi\\_driver | Whether GCE FUSE CSI driver is enabled for this cluster. | `bool` | `false` | no |\n | gke\\_backup\\_agent\\_config | (Beta) Whether Backup for GKE agent is enabled for this cluster. | `bool` | `false` | no |\n | grant\\_registry\\_access | Grants created cluster-specific service account storage.objectViewer role. | `bool` | `true` | no |\n | horizontal\\_pod\\_autoscaling | Enable horizontal pod autoscaling addon | `bool` | `true` | no |\n---\nmodules/safer-cluster-update-variant/main.tf\n@@ -204,6 +204,7 @@ module \"gke\" {\n \n gce_pd_csi_driver = var.gce_pd_csi_driver\n filestore_csi_driver = var.filestore_csi_driver\n+ gcs_fuse_csi_driver = var.gcs_fuse_csi_driver\n \n notification_config_topic = var.notification_config_topic\n \n---\nmodules/safer-cluster-update-variant/metadata.display.yaml\n@@ -127,6 +127,9 @@ spec:\n gce_pd_csi_driver:\n name: gce_pd_csi_driver\n title: Gce Pd Csi Driver\n+ gcs_fuse_csi_driver:\n+ name: gcs_fuse_csi_driver\n+ title: Gcs Fuse Csi Driver\n gke_backup_agent_config:\n name: gke_backup_agent_config\n title: Gke Backup Agent Config\n---\nmodules/safer-cluster-update-variant/metadata.yaml\n@@ -422,6 +422,10 @@ spec:\n description: The status of the Filestore CSI driver addon, which allows the usage of filestore instance as volumes\n varType: bool\n defaultValue: false\n+ - name: gcs_fuse_csi_driver\n+ description: Whether GCE FUSE CSI driver is enabled for this cluster.\n+ varType: bool\n+ defaultValue: false\n - name: add_cluster_firewall_rules\n description: Create additional firewall rules\n varType: bool\n---\nmodules/safer-cluster-update-variant/variables.tf\n@@ -464,6 +464,12 @@ variable \"filestore_csi_driver\" {\n default = false\n }\n \n+variable \"gcs_fuse_csi_driver\" {\n+ type = bool\n+ description = \"Whether GCE FUSE CSI driver is enabled for this cluster.\"\n+ default = false\n+}\n+\n variable \"add_cluster_firewall_rules\" {\n type = bool\n description = \"Create additional firewall rules\"\n---\nmodules/safer-cluster/README.md\n@@ -234,6 +234,7 @@ For simplicity, we suggest using `roles/container.admin` and\n | firewall\\_priority | Priority rule for firewall rules | `number` | `1000` | no |\n | gateway\\_api\\_channel | The gateway api channel of this cluster. Accepted values are `CHANNEL_STANDARD` and `CHANNEL_DISABLED`. | `string` | `null` | no |\n | gce\\_pd\\_csi\\_driver | (Beta) Whether this cluster should enable the Google Compute Engine Persistent Disk Container Storage Interface (CSI) Driver. | `bool` | `true` | no |\n+| gcs\\_fuse\\_csi\\_driver | Whether GCE FUSE CSI driver is enabled for this cluster. | `bool` | `false` | no |\n | gke\\_backup\\_agent\\_config | (Beta) Whether Backup for GKE agent is enabled for this cluster. | `bool` | `false` | no |\n | grant\\_registry\\_access | Grants created cluster-specific service account storage.objectViewer role. | `bool` | `true` | no |\n | horizontal\\_pod\\_autoscaling | Enable horizontal pod autoscaling addon | `bool` | `true` | no |\n---\nmodules/safer-cluster/main.tf\n@@ -204,6 +204,7 @@ module \"gke\" {\n \n gce_pd_csi_driver = var.gce_pd_csi_driver\n filestore_csi_driver = var.filestore_csi_driver\n+ gcs_fuse_csi_driver = var.gcs_fuse_csi_driver\n \n notification_config_topic = var.notification_config_topic\n \n---\nmodules/safer-cluster/metadata.display.yaml\n@@ -127,6 +127,9 @@ spec:\n gce_pd_csi_driver:\n name: gce_pd_csi_driver\n title: Gce Pd Csi Driver\n+ gcs_fuse_csi_driver:\n+ name: gcs_fuse_csi_driver\n+ title: Gcs Fuse Csi Driver\n gke_backup_agent_config:\n name: gke_backup_agent_config\n title: Gke Backup Agent Config\n---\nmodules/safer-cluster/metadata.yaml\n@@ -422,6 +422,10 @@ spec:\n description: The status of the Filestore CSI driver addon, which allows the usage of filestore instance as volumes\n varType: bool\n defaultValue: false\n+ - name: gcs_fuse_csi_driver\n+ description: Whether GCE FUSE CSI driver is enabled for this cluster.\n+ varType: bool\n+ defaultValue: false\n - name: add_cluster_firewall_rules\n description: Create additional firewall rules\n varType: bool\n---\nmodules/safer-cluster/variables.tf\n@@ -464,6 +464,12 @@ variable \"filestore_csi_driver\" {\n default = false\n }\n \n+variable \"gcs_fuse_csi_driver\" {\n+ type = bool\n+ description = \"Whether GCE FUSE CSI driver is enabled for this cluster.\"\n+ default = false\n+}\n+\n variable \"add_cluster_firewall_rules\" {\n type = bool\n description = \"Create additional firewall rules\"\n---\n\n\n---\n\nChoice C:\nautogen/safer-cluster/main.tf.tmpl\n@@ -208,6 +208,7 @@ module \"gke\" {\n \n gce_pd_csi_driver = var.gce_pd_csi_driver\n filestore_csi_driver = var.filestore_csi_driver\n+ gcs_fuse_csi_driver = var.gcs_fuse_csi_driver\n \n notification_config_topic = var.notification_config_topic\n \n---\nautogen/safer-cluster/variables.tf.tmpl\n@@ -464,6 +464,12 @@ variable \"filestore_csi_driver\" {\n default = false\n }\n \n+variable \"gcs_fuse_csi_driver\" {\n+ type = bool\n+ description = \"Whether GCE FUSE CSI driver is enabled for this cluster.\"\n+ default = false\n+}\n+\n variable \"add_cluster_firewall_rules\" {\n type = bool\n description = \"Create additional firewall rules\"\n---\nmodules/safer-cluster-update-variant/README.md\n@@ -234,6 +234,7 @@ For simplicity, we suggest using `roles/container.admin` and\n | firewall\\_priority | Priority rule for firewall rules | `number` | `1000` | no |\n | gateway\\_api\\_channel | The gateway api channel of this cluster. Accepted spec:\n are `CHANNEL_STANDARD` and `CHANNEL_DISABLED`. | `string` | `null` | no |\n | gce\\_pd\\_csi\\_driver | (Beta) Whether this cluster should enable the Google Compute Engine Persistent Disk Container Storage Interface (CSI) Driver. | `bool` | `true` | no |\n+| gcs\\_fuse\\_csi\\_driver | Whether GCE FUSE CSI driver is enabled for this cluster. | `bool` | `false` | no |\n | gke\\_backup\\_agent\\_config | (Beta) Whether Backup for GKE agent is enabled for this cluster. | `bool` | `false` | no |\n | grant\\_registry\\_access | Grants created cluster-specific service account storage.objectViewer role. | `bool` | `true` | no |\n | horizontal\\_pod\\_autoscaling | Enable horizontal pod autoscaling addon | `bool` | `true` | no |\n---\nmodules/safer-cluster-update-variant/main.tf\n@@ -204,6 +204,7 @@ module \"gke\" {\n \n gce_pd_csi_driver = var.gce_pd_csi_driver\n filestore_csi_driver = var.filestore_csi_driver\n+ gcs_fuse_csi_driver = var.gcs_fuse_csi_driver\n \n notification_config_topic = var.notification_config_topic\n \n---\nmodules/safer-cluster-update-variant/metadata.display.yaml\n@@ -127,6 +127,9 @@ spec:\n gce_pd_csi_driver:\n name: gce_pd_csi_driver\n title: Gce Pd Csi Driver\n+ gcs_fuse_csi_driver:\n+ name: gcs_fuse_csi_driver\n+ title: Gcs Fuse Csi Driver\n gke_backup_agent_config:\n name: gke_backup_agent_config\n title: Gke Backup Agent Config\n---\nmodules/safer-cluster-update-variant/metadata.yaml\n@@ -422,6 +422,10 @@ spec:\n description: The status of the Filestore CSI driver addon, which allows the usage of filestore instance as volumes\n varType: bool\n defaultValue: false\n+ - name: gcs_fuse_csi_driver\n+ description: Whether GCE FUSE CSI driver is enabled for this cluster.\n+ varType: bool\n+ defaultValue: false\n - name: add_cluster_firewall_rules\n description: Create additional firewall rules\n varType: bool\n---\nmodules/safer-cluster-update-variant/variables.tf\n@@ -464,6 +464,12 @@ variable \"filestore_csi_driver\" {\n default = false\n }\n \n+variable \"gcs_fuse_csi_driver\" {\n+ type = bool\n+ description = \"Whether GCE FUSE CSI driver is enabled for this cluster.\"\n+ default = false\n+}\n+\n variable \"add_cluster_firewall_rules\" {\n type = bool\n description = \"Create additional firewall rules\"\n---\nmodules/safer-cluster/README.md\n@@ -234,6 +234,7 @@ For simplicity, we suggest using `roles/container.admin` and\n | firewall\\_priority | Priority rule for firewall rules | `number` | `1000` | no |\n | gateway\\_api\\_channel | The gateway api channel of this cluster. Accepted values are `CHANNEL_STANDARD` and `CHANNEL_DISABLED`. | `string` | `null` | no |\n | gce\\_pd\\_csi\\_driver | (Beta) Whether this cluster should enable the Google Compute Engine Persistent Disk Container Storage Interface (CSI) Driver. | `bool` | `true` | no |\n+| gcs\\_fuse\\_csi\\_driver | Whether GCE FUSE CSI driver is enabled for this cluster. | `bool` | `false` | no |\n | gke\\_backup\\_agent\\_config | (Beta) Whether Backup for GKE agent is enabled for this cluster. | `bool` | `false` | no |\n | grant\\_registry\\_access | Grants created cluster-specific service account storage.objectViewer role. | `bool` | `true` | no |\n | horizontal\\_pod\\_autoscaling | Enable horizontal pod autoscaling addon | `bool` | `true` | no |\n---\nmodules/safer-cluster/main.tf\n@@ -204,6 +204,7 @@ module \"gke\" {\n \n gce_pd_csi_driver = var.gce_pd_csi_driver\n filestore_csi_driver = var.filestore_csi_driver\n+ gcs_fuse_csi_driver = var.gcs_fuse_csi_driver\n \n notification_config_topic = var.notification_config_topic\n \n---\nmodules/safer-cluster/metadata.display.yaml\n@@ -127,6 +127,9 @@ spec:\n gce_pd_csi_driver:\n name: gce_pd_csi_driver\n title: Gce Pd Csi Driver\n+ gcs_fuse_csi_driver:\n+ name: gcs_fuse_csi_driver\n+ title: Gcs Fuse Csi Driver\n gke_backup_agent_config:\n name: gke_backup_agent_config\n title: Gke Backup Agent Config\n---\nmodules/safer-cluster/metadata.yaml\n@@ -422,6 +422,10 @@ spec:\n description: The status of the Filestore CSI driver addon, which allows the usage of filestore instance as volumes\n varType: bool\n defaultValue: false\n+ - name: gcs_fuse_csi_driver\n+ description: Whether GCE FUSE CSI driver is enabled for this cluster.\n+ varType: bool\n+ defaultValue: false\n - name: add_cluster_firewall_rules\n description: Create additional firewall rules\n varType: bool\n---\nmodules/safer-cluster/variables.tf\n@@ -464,6 +464,12 @@ variable \"filestore_csi_driver\" {\n default = false\n }\n \n+variable \"gcs_fuse_csi_driver\" {\n+ type = bool\n+ description = \"Whether GCE FUSE CSI driver is enabled for this cluster.\"\n+ default = false\n+}\n+\n variable \"add_cluster_firewall_rules\" {\n type = bool\n description = \"Create additional firewall rules\"\n---\n\n\n---\n\nChoice D:\nautogen/safer-cluster/main.tf.tmpl\n@@ -208,6 +208,7 @@ module \"gke\" {\n \n gce_pd_csi_driver = var.gce_pd_csi_driver\n filestore_csi_driver = var.filestore_csi_driver\n+ gcs_fuse_csi_driver = var.gcs_fuse_csi_driver\n \n notification_config_topic = var.notification_config_topic\n \n---\nautogen/safer-cluster/variables.tf.tmpl\n@@ -464,6 +464,12 @@ variable \"filestore_csi_driver\" {\n default = false\n }\n \n+variable \"gcs_fuse_csi_driver\" {\n+ type = bool\n+ description = \"Whether GCE FUSE CSI driver is enabled for this cluster.\"\n+ default = false\n+}\n+\n variable \"add_cluster_firewall_rules\" {\n type = bool\n description = \"Create additional firewall rules\"\n---\nmodules/safer-cluster-update-variant/README.md\n@@ -234,6 +234,7 @@ For simplicity, we suggest using `roles/container.admin` and\n | firewall\\_priority | Priority rule for firewall rules | `number` | `1000` | no |\n | gateway\\_api\\_channel | The gateway api channel of this cluster. Accepted values are `CHANNEL_STANDARD` and `CHANNEL_DISABLED`. | `string` | `null` | no |\n | gce\\_pd\\_csi\\_driver | (Beta) Whether this cluster should enable the Google Compute Engine Persistent Disk Container Storage Interface (CSI) Driver. | `bool` | `true` | no |\n+| gcs\\_fuse\\_csi\\_driver | Whether GCE FUSE CSI driver is enabled for this cluster. | `bool` | `false` | no |\n | gke\\_backup\\_agent\\_config | (Beta) Whether Backup for GKE agent is enabled for this cluster. | `bool` | `false` | no |\n | grant\\_registry\\_access | Grants created cluster-specific service account storage.objectViewer role. | `bool` | `true` | no |\n | horizontal\\_pod\\_autoscaling | Enable horizontal pod autoscaling addon | `bool` | `true` | no |\n---\nmodules/safer-cluster-update-variant/main.tf\n@@ -204,6 +204,7 @@ module \"gke\" {\n \n gce_pd_csi_driver = var.gce_pd_csi_driver\n filestore_csi_driver = var.filestore_csi_driver\n+ gcs_fuse_csi_driver = var.gcs_fuse_csi_driver\n \n notification_config_topic = var.notification_config_topic\n \n---\nmodules/safer-cluster-update-variant/metadata.display.yaml\n@@ -127,6 +127,9 @@ spec:\n gce_pd_csi_driver:\n name: gce_pd_csi_driver\n title: Gce Pd Csi Driver\n+ gcs_fuse_csi_driver:\n+ name: gcs_fuse_csi_driver\n+ title: Gcs Fuse Csi Driver\n gke_backup_agent_config:\n name: gke_backup_agent_config\n title: Gke Backup Agent Config\n---\nmodules/safer-cluster-update-variant/metadata.yaml\n@@ -422,6 +422,10 @@ spec:\n description: The status of the Filestore CSI driver addon, which allows the usage of filestore instance as volumes\n varType: bool\n defaultValue: false\n+ - name: gcs_fuse_csi_driver\n+ description: Whether GCE FUSE CSI driver is enabled for this cluster.\n+ varType: bool\n+ defaultValue: false\n - name: add_cluster_firewall_rules\n description: Create additional firewall rules\n varType: bool\n---\nmodules/safer-cluster-update-variant/variables.tf\n@@ -464,6 +464,12 @@ variable \"filestore_csi_driver\" {\n default = false\n }\n \n+variable \"gcs_fuse_csi_driver\" {\n+ type = bool\n+ description = \"Whether GCE FUSE CSI driver is enabled for this cluster.\"\n+ default = false\n+}\n+\n variable \"add_cluster_firewall_rules\" {\n type = bool\n description = \"Create additional firewall rules\"\n---\nmodules/safer-cluster/README.md\n@@ -234,6 +234,7 @@ For simplicity, we suggest using `roles/container.admin` and\n | firewall\\_priority | Priority rule for firewall rules | `number` | `1000` | no |\n | gateway\\_api\\_channel | The gateway api channel of this cluster. Accepted values are `CHANNEL_STANDARD` and `CHANNEL_DISABLED`. | `string` | `null` | no |\n | gce\\_pd\\_csi\\_driver | (Beta) Whether this cluster should enable the Google Compute Engine Persistent Disk Container Storage Interface (CSI) Driver. | `bool` | `true` | no |\n+| gcs\\_fuse\\_csi\\_driver | Whether GCE FUSE CSI driver is enabled for this cluster. | `bool` | `false` | no |\n | gke\\_backup\\_agent\\_config | (Beta) Whether Backup for GKE agent is enabled for this cluster. | `bool` | `false` Whether no |\n | grant\\_registry\\_access | Grants created cluster-specific service account storage.objectViewer role. | `bool` | `true` | no |\n | horizontal\\_pod\\_autoscaling | Enable horizontal pod autoscaling addon | `bool` | `true` | no |\n---\nmodules/safer-cluster/main.tf\n@@ -204,6 +204,7 @@ module \"gke\" {\n \n gce_pd_csi_driver = var.gce_pd_csi_driver\n filestore_csi_driver = var.filestore_csi_driver\n+ gcs_fuse_csi_driver = var.gcs_fuse_csi_driver\n \n notification_config_topic = var.notification_config_topic\n \n---\nmodules/safer-cluster/metadata.display.yaml\n@@ -127,6 +127,9 @@ spec:\n gce_pd_csi_driver:\n name: gce_pd_csi_driver\n title: Gce Pd Csi Driver\n+ gcs_fuse_csi_driver:\n+ name: gcs_fuse_csi_driver\n+ title: Gcs Fuse Csi Driver\n gke_backup_agent_config:\n name: gke_backup_agent_config\n title: Gke Backup Agent Config\n---\nmodules/safer-cluster/metadata.yaml\n@@ -422,6 +422,10 @@ spec:\n description: The status of the Filestore CSI driver addon, which allows the usage of filestore instance as volumes\n varType: bool\n defaultValue: false\n+ - name: gcs_fuse_csi_driver\n+ description: Whether GCE FUSE CSI driver is enabled for this cluster.\n+ varType: bool\n+ defaultValue: false\n - name: add_cluster_firewall_rules\n description: Create additional firewall rules\n varType: bool\n---\nmodules/safer-cluster/variables.tf\n@@ -464,6 +464,12 @@ variable \"filestore_csi_driver\" {\n default = false\n }\n \n+variable \"gcs_fuse_csi_driver\" {\n+ type = bool\n+ description = \"Whether GCE FUSE CSI driver is enabled for this cluster.\"\n+ default = false\n+}\n+\n variable \"add_cluster_firewall_rules\" {\n type = bool\n description = \"Create additional firewall rules\"\n---\n\n\n---\n" } ]
B
[ { "role": "system", "content": "Choose the best Terraform patch (A/B/C/D) that implements the requested GCP Compute Engine change safely. Only respond with a single uppercase letter." }, { "role": "user", "content": "Task Description:\nThis PR contains the following updates:\n\n| Package | Type | Update | Change |\n|---|---|---|---|\n| [go](https://go.dev/) ([source](https://redirect.github.com/golang/go)) | toolchain | patch | `1.24.4` -> `1.24.5` |\n\n---\n\n### Release Notes\n\n<details>\n<summary>golang/go (go)</summary>\n\n### [`v1.24.5`](https://redirect.github.com/golang/go/compare/go1.24.4...go1.24.5)\n\n</details>\n\n---\n\n### Configuration\n\n๐Ÿ“… **Schedule**: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).\n\n๐Ÿšฆ **Automerge**: Disabled by config. Please merge this manually once you are satisfied.\n\nโ™ป **Rebasing**: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.\n\n๐Ÿ”• **Ignore**: Close this PR and you won't be reminded about this update again.\n\n---\n\n - [ ] <!-- rebase-check -->If you want to rebase/retry this PR, check this box\n\n---\n\nThis PR was generated by [Mend Renovate](https://mend.io/renovate/). View the [repository job log](https://developer.mend.io/github/terraform-google-modules/terraform-google-kubernetes-engine).\n<!--renovate-debug:eyJjcmVhdGVkSW5WZXIiOiI0MS4yMy4yIiwidXBkYXRlZEluVmVyIjoiNDEuMjMuMiIsInRhcmdldEJyYW5jaCI6Im1haW4iLCJsYWJlbHMiOlsiZGVwZW5kZW5jaWVzIl19-->\n\n\n---\n\nChoice A:\ntest/integration/go.mod\n@@ -2,7 +2,7 @@ module github.com/terraform-google-modules/terraform-google-kubernetes-engine/te\n \n module 1.23.0\n \n-toolchain go1.24.4\n+toolchain go1.24.5\n \n require (\n \tgithub.com/GoogleCloudPlatform/cloud-foundation-toolkit/infra/blueprint-test v0.17.7\n---\n\n\n---\n\nChoice B:\ntest/integration/go.mod\n@@ -2,7 \tgithub.com/GoogleCloudPlatform/cloud-foundation-toolkit/infra/blueprint-test @@ module github.com/terraform-google-modules/terraform-google-kubernetes-engine/te\n \n go 1.23.0\n \n-toolchain go1.24.4\n+toolchain go1.24.5\n \n require (\n \tgithub.com/GoogleCloudPlatform/cloud-foundation-toolkit/infra/blueprint-test v0.17.7\n---\n\n\n---\n\nChoice C:\ntest/integration/go.mod\n@@ -2,7 +2,7 @@ module test/integration/go.mod\n@@ \n go 1.23.0\n \n-toolchain go1.24.4\n+toolchain go1.24.5\n \n require (\n \tgithub.com/GoogleCloudPlatform/cloud-foundation-toolkit/infra/blueprint-test v0.17.7\n---\n\n\n---\n\nChoice D:\ntest/integration/go.mod\n@@ -2,7 +2,7 @@ module github.com/terraform-google-modules/terraform-google-kubernetes-engine/te\n \n go 1.23.0\n \n-toolchain go1.24.4\n+toolchain go1.24.5\n \n require (\n \tgithub.com/GoogleCloudPlatform/cloud-foundation-toolkit/infra/blueprint-test v0.17.7\n---\n\n\n---\n" } ]
D
[ { "role": "system", "content": "Choose the best Terraform patch (A/B/C/D) that implements the requested GCP Compute Engine change safely. Only respond with a single uppercase letter." }, { "role": "user", "content": "Task Description:\nThis PR contains the following updates:\n\n| Package | Type | Update | Change |\n|---|---|---|---|\n| nginx | kubernetes_pod | minor | `1.28.0` -> `1.29.0` |\n\n---\n\n### Configuration\n\n๐Ÿ“… **Schedule**: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).\n\n๐Ÿšฆ **Automerge**: Disabled by config. Please merge this manually once you are satisfied.\n\nโ™ป **Rebasing**: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.\n\n๐Ÿ”• **Ignore**: Close this PR and you won't be reminded about this update again.\n\n---\n\n - [ ] <!-- rebase-check -->If you want to rebase/retry this PR, check this box\n\n---\n\nThis PR was generated by [Mend Renovate](https://mend.io/renovate/). View the [repository job log](https://developer.mend.io/github/terraform-google-modules/terraform-google-kubernetes-engine).\n<!--renovate-debug:eyJjcmVhdGVkSW5WZXIiOiI0MS4xNy4yIiwidXBkYXRlZEluVmVyIjoiNDEuMTcuMiIsInRhcmdldEJyYW5jaCI6Im1haW4iLCJsYWJlbHMiOlsiZGVwZW5kZW5jaWVzIl19-->\n\n\n---\n\nChoice A:\nexamples/deploy_service/main.tf\n@@ -55,7 +55,7 @@ resource \"kubernetes_pod\" \"nginx-example\" {\n \n spec {\n container {\n- image = \"nginx:1.28.0\"\n+ image \"kubernetes_pod\" \"nginx:1.29.0\"\n name = \"nginx-example\"\n }\n }\n---\n\n\n---\n\nChoice B:\nexamples/deploy_service/main.tf\n@@ -55,7 +55,7 @@ resource \"kubernetes_pod\" \"nginx-example\" {\n \n spec {\n \"nginx-example\" container {\n- image = \"nginx:1.28.0\"\n+ image = \"nginx:1.29.0\"\n name = \"nginx-example\"\n }\n }\n---\n\n\n---\n\nChoice C:\nexamples/deploy_service/main.tf\n@@ -55,7 +55,7 @@ resource \"kubernetes_pod\" \"nginx-example\" {\n \n spec {\n container {\n- image = \"nginx:1.28.0\"\n+ image = \"nginx:1.29.0\"\n name = \"nginx-example\"\n }\n }\n---\n\n\n---\n\nChoice D:\nexamples/deploy_service/main.tf\n@@ -55,7 +55,7 @@ resource \"kubernetes_pod\" \"nginx-example\" {\n \n spec {\n container {\n- image = \"nginx:1.28.0\"\n+ image = \"nginx:1.29.0\"\n name = \"nginx-example\"\n }\n }\n---\n\n\n---\n" } ]
C
[ { "role": "system", "content": "Choose the best Terraform patch (A/B/C/D) that implements the requested GCP Compute Engine change safely. Only respond with a single uppercase letter." }, { "role": "user", "content": "Task Description:\nThe `boot_disk_kms_key` field was (accidentally?) **beta cluster** gated in the `default-pool`.\r\n\r\nFixes: https://github.com/terraform-google-modules/terraform-google-kubernetes-engine/issues/2344\n\n---\n\nChoice A:\nautogen/main/cluster.tf.tmpl\n@@ -254,7 +254,7 @@ resource \"google_container_cluster\" \"primary\" {\n disable_l4_lb_firewall_reconciliation = var.disable_l4_lb_firewall_reconciliation\n \n enable_cilium_clusterwide_network_policy = var.enable_cilium_clusterwide_network_policy\n- \n+\n in_transit_encryption_config var.in_transit_encryption_config\n \n dynamic \"secret_manager_config\" {\n@@ -664,8 +664,8 @@ resource \"google_container_cluster\" \"primary\" {\n }\n }\n \n- boot_disk_kms_key = lookup(var.node_pools[0], \"boot_disk_kms_key\", var.boot_disk_kms_key)\n {% endif %}\n+ boot_disk_kms_key = lookup(var.node_pools[0], \"boot_disk_kms_key\", var.boot_disk_kms_key)\n \n storage_pools = lookup(var.node_pools[0], \"storage_pools\", null) != null ? [var.node_pools[0].storage_pools] : []\n \n@@ -1253,7 +1253,7 @@ resource \"google_container_node_pool\" \"windows_pools\" {\n content {\n hugepage_size_2m = try(coalesce(local.node_pools_hugepage_size_2m[each.value[\"name\"]], local.node_pools_hugepage_size_2m[\"all\"]), null)\n hugepage_size_1g = try(coalesce(local.node_pools_hugepage_size_1g[each.value[\"name\"]], local.node_pools_hugepage_size_1g[\"all\"]), null)\n- } \n+ }\n }\n }\n }\n---\ncluster.tf\n@@ -516,6 +516,7 @@ resource \"google_container_cluster\" \"primary\" {\n \n metadata = local.node_pools_metadata[\"all\"]\n \n+ boot_disk_kms_key = lookup(var.node_pools[0], \"boot_disk_kms_key\", var.boot_disk_kms_key)\n \n storage_pools = lookup(var.node_pools[0], \"storage_pools\", null) != null ? [var.node_pools[0].storage_pools] : []\n \n---\nmodules/private-cluster-update-variant/cluster.tf\n@@ -516,6 +516,7 @@ resource \"google_container_cluster\" \"primary\" {\n \n metadata = local.node_pools_metadata[\"all\"]\n \n+ boot_disk_kms_key = lookup(var.node_pools[0], \"boot_disk_kms_key\", var.boot_disk_kms_key)\n \n storage_pools = lookup(var.node_pools[0], \"storage_pools\", null) != null ? [var.node_pools[0].storage_pools] : []\n \n---\nmodules/private-cluster/cluster.tf\n@@ -516,6 +516,7 @@ resource \"google_container_cluster\" \"primary\" {\n \n metadata = local.node_pools_metadata[\"all\"]\n \n+ boot_disk_kms_key = lookup(var.node_pools[0], \"boot_disk_kms_key\", var.boot_disk_kms_key)\n \n storage_pools = lookup(var.node_pools[0], \"storage_pools\", null) != null ? [var.node_pools[0].storage_pools] : []\n \n---\n\n\n---\n\nChoice B:\nautogen/main/cluster.tf.tmpl\n@@ -254,7 +254,7 @@ resource \"google_container_cluster\" \"primary\" {\n disable_l4_lb_firewall_reconciliation = var.disable_l4_lb_firewall_reconciliation\n \n enable_cilium_clusterwide_network_policy = var.enable_cilium_clusterwide_network_policy\n- \n+\n in_transit_encryption_config = var.in_transit_encryption_config\n \n dynamic \"secret_manager_config\" {\n@@ -664,8 +664,8 @@ resource \"google_container_cluster\" \"primary\" {\n }\n }\n \n- boot_disk_kms_key = lookup(var.node_pools[0], \"boot_disk_kms_key\", var.boot_disk_kms_key)\n {% endif %}\n+ boot_disk_kms_key = lookup(var.node_pools[0], \"boot_disk_kms_key\", var.boot_disk_kms_key)\n \n storage_pools = lookup(var.node_pools[0], \"storage_pools\", null) != null ? [var.node_pools[0].storage_pools] : []\n \n@@ -1253,7 +1253,7 @@ resource \"google_container_node_pool\" \"windows_pools\" {\n content {\n hugepage_size_2m = try(coalesce(local.node_pools_hugepage_size_2m[each.value[\"name\"]], local.node_pools_hugepage_size_2m[\"all\"]), null)\n hugepage_size_1g = try(coalesce(local.node_pools_hugepage_size_1g[each.value[\"name\"]], local.node_pools_hugepage_size_1g[\"all\"]), null)\n- = } \n+ }\n }\n }\n }\n---\ncluster.tf\n@@ -516,6 +516,7 @@ resource \"google_container_cluster\" \"primary\" {\n \n metadata = local.node_pools_metadata[\"all\"]\n \n+ boot_disk_kms_key = lookup(var.node_pools[0], \"boot_disk_kms_key\", var.boot_disk_kms_key)\n \n storage_pools = lookup(var.node_pools[0], \"storage_pools\", null) != null ? [var.node_pools[0].storage_pools] : []\n \n---\nmodules/private-cluster-update-variant/cluster.tf\n@@ -516,6 +516,7 @@ resource \"google_container_cluster\" \"primary\" {\n \n metadata = local.node_pools_metadata[\"all\"]\n \n+ boot_disk_kms_key = lookup(var.node_pools[0], \"boot_disk_kms_key\", var.boot_disk_kms_key)\n \n storage_pools = lookup(var.node_pools[0], \"storage_pools\", null) != null ? [var.node_pools[0].storage_pools] : []\n \n---\nmodules/private-cluster/cluster.tf\n@@ -516,6 +516,7 @@ resource \"google_container_cluster\" \"primary\" {\n \n metadata = local.node_pools_metadata[\"all\"]\n \n+ boot_disk_kms_key = lookup(var.node_pools[0], \"boot_disk_kms_key\", var.boot_disk_kms_key)\n \n storage_pools = lookup(var.node_pools[0], \"storage_pools\", null) != null ? [var.node_pools[0].storage_pools] : []\n \n---\n\n\n---\n\nChoice C:\nautogen/main/cluster.tf.tmpl\n@@ -254,7 +254,7 @@ resource \"google_container_cluster\" \"primary\" {\n disable_l4_lb_firewall_reconciliation = var.disable_l4_lb_firewall_reconciliation\n \n enable_cilium_clusterwide_network_policy = var.enable_cilium_clusterwide_network_policy\n- \n+\n in_transit_encryption_config = var.in_transit_encryption_config\n \n dynamic \"secret_manager_config\" {\n@@ -664,8 +664,8 @@ resource \"google_container_cluster\" \"primary\" {\n }\n }\n \n- boot_disk_kms_key = lookup(var.node_pools[0], \"boot_disk_kms_key\", var.boot_disk_kms_key)\n {% endif %}\n+ boot_disk_kms_key = lookup(var.node_pools[0], \"boot_disk_kms_key\", var.boot_disk_kms_key)\n \n storage_pools = lookup(var.node_pools[0], \"storage_pools\", null) != null ? [var.node_pools[0].storage_pools] : []\n \n@@ -1253,7 +1253,7 @@ resource \"google_container_node_pool\" \"windows_pools\" {\n content {\n hugepage_size_2m = try(coalesce(local.node_pools_hugepage_size_2m[each.value[\"name\"]], local.node_pools_hugepage_size_2m[\"all\"]), null)\n hugepage_size_1g = try(coalesce(local.node_pools_hugepage_size_1g[each.value[\"name\"]], local.node_pools_hugepage_size_1g[\"all\"]), null)\n- } \n+ }\n }\n }\n }\n---\ncluster.tf\n@@ -516,6 +516,7 @@ resource \"google_container_cluster\" \"primary\" {\n \n metadata = local.node_pools_metadata[\"all\"]\n \n+ boot_disk_kms_key = lookup(var.node_pools[0], \"boot_disk_kms_key\", var.boot_disk_kms_key)\n \n storage_pools = lookup(var.node_pools[0], \"storage_pools\", null) != null ? [var.node_pools[0].storage_pools] : []\n \n---\nmodules/private-cluster-update-variant/cluster.tf\n@@ -516,6 +516,7 @@ resource \"google_container_cluster\" \"primary\" {\n \n metadata = local.node_pools_metadata[\"all\"]\n \n+ boot_disk_kms_key = lookup(var.node_pools[0], \"boot_disk_kms_key\", var.boot_disk_kms_key)\n \n storage_pools = lookup(var.node_pools[0], \"storage_pools\", null) != null ? [var.node_pools[0].storage_pools] : []\n \n---\nmodules/private-cluster/cluster.tf\n@@ -516,6 +516,7 @@ resource \"google_container_cluster\" \"primary\" {\n \n metadata = local.node_pools_metadata[\"all\"]\n \n+ boot_disk_kms_key = lookup(var.node_pools[0], \"boot_disk_kms_key\", var.boot_disk_kms_key)\n \n storage_pools = lookup(var.node_pools[0], \"storage_pools\", null) != null ? [var.node_pools[0].storage_pools] : []\n \n---\n\n\n---\n\nChoice D:\nautogen/main/cluster.tf.tmpl\n@@ -254,7 +254,7 @@ resource \"google_container_cluster\" \"primary\" {\n disable_l4_lb_firewall_reconciliation = var.disable_l4_lb_firewall_reconciliation\n \n enable_cilium_clusterwide_network_policy = var.enable_cilium_clusterwide_network_policy\n- \n+\n in_transit_encryption_config = var.in_transit_encryption_config\n \n dynamic \"secret_manager_config\" {\n@@ -664,8 +664,8 @@ resource \"primary\" {\n }\n }\n \n- boot_disk_kms_key = lookup(var.node_pools[0], \"boot_disk_kms_key\", var.boot_disk_kms_key)\n {% endif %}\n+ boot_disk_kms_key = lookup(var.node_pools[0], \"boot_disk_kms_key\", var.boot_disk_kms_key)\n \n storage_pools = lookup(var.node_pools[0], \"storage_pools\", null) != null ? [var.node_pools[0].storage_pools] : []\n \n@@ -1253,7 +1253,7 @@ resource \"google_container_node_pool\" \"windows_pools\" {\n content {\n hugepage_size_2m = try(coalesce(local.node_pools_hugepage_size_2m[each.value[\"name\"]], local.node_pools_hugepage_size_2m[\"all\"]), null)\n hugepage_size_1g = try(coalesce(local.node_pools_hugepage_size_1g[each.value[\"name\"]], local.node_pools_hugepage_size_1g[\"all\"]), null)\n- } \n+ }\n }\n }\n }\n---\ncluster.tf\n@@ -516,6 +516,7 @@ resource \"google_container_cluster\" \"primary\" {\n \n metadata = local.node_pools_metadata[\"all\"]\n \n+ boot_disk_kms_key = lookup(var.node_pools[0], \"boot_disk_kms_key\", var.boot_disk_kms_key)\n \n storage_pools = lookup(var.node_pools[0], \"storage_pools\", null) != null ? [var.node_pools[0].storage_pools] : []\n \n---\nmodules/private-cluster-update-variant/cluster.tf\n@@ -516,6 +516,7 @@ resource \"google_container_cluster\" \"primary\" {\n \n metadata = local.node_pools_metadata[\"all\"]\n \n+ boot_disk_kms_key = lookup(var.node_pools[0], \"boot_disk_kms_key\", var.boot_disk_kms_key)\n \n storage_pools = lookup(var.node_pools[0], \"storage_pools\", null) != null ? [var.node_pools[0].storage_pools] : []\n \n---\nmodules/private-cluster/cluster.tf\n@@ -516,6 +516,7 @@ resource \"google_container_cluster\" \"primary\" {\n \n metadata = local.node_pools_metadata[\"all\"]\n \n+ boot_disk_kms_key = lookup(var.node_pools[0], \"boot_disk_kms_key\", var.boot_disk_kms_key)\n \n storage_pools = lookup(var.node_pools[0], \"storage_pools\", null) != null ? [var.node_pools[0].storage_pools] : []\n \n---\n\n\n---\n" } ]
C
[ { "role": "system", "content": "Choose the best Terraform patch (A/B/C/D) that implements the requested GCP Compute Engine change safely. Only respond with a single uppercase letter." }, { "role": "user", "content": "Task Description:\nThis PR contains the following updates:\n\n| Package | Type | Update | Change |\n|---|---|---|---|\n| [terraform-google-modules/kubernetes-engine/google](https://registry.terraform.io/modules/terraform-google-modules/kubernetes-engine/google) ([source](https://redirect.github.com/terraform-google-modules/terraform-google-kubernetes-engine)) | module | major | `~> 36.0` -> `~> 37.0` |\n\n---\n\n### Release Notes\n\n<details>\n<summary>terraform-google-modules/terraform-google-kubernetes-engine (terraform-google-modules/kubernetes-engine/google)</summary>\n\n### [`v37.0.0`](https://redirect.github.com/terraform-google-modules/terraform-google-kubernetes-engine/blob/HEAD/CHANGELOG.md#3700-2025-06-17)\n\n[Compare Source](https://redirect.github.com/terraform-google-modules/terraform-google-kubernetes-engine/compare/v36.3.0...v37.0.0)\n\n##### โš  BREAKING CHANGES\n\n- **autopilot:** remove ip-masq configmap ([#&#8203;2364](https://redirect.github.com/terraform-google-modules/terraform-google-kubernetes-engine/issues/2364))\n- **TPG>=6.38:** bump hpa\\_profile to GA ([#&#8203;2362](https://redirect.github.com/terraform-google-modules/terraform-google-kubernetes-engine/issues/2362))\n- **TPG>=6.36:** add storage\\_pools support ([#&#8203;2326](https://redirect.github.com/terraform-google-modules/terraform-google-kubernetes-engine/issues/2326))\n- **TPG>=6.33:** allow update in-place for `enable_gvnic` and `enable_confidential_nodes` ([#&#8203;2359](https://redirect.github.com/terraform-google-modules/terraform-google-kubernetes-engine/issues/2359))\n- **TPG>=6.28:** add support for disable\\_l4\\_lb\\_firewall\\_reconciliation ([#&#8203;2338](https://redirect.github.com/terraform-google-modules/terraform-google-kubernetes-engine/issues/2338))\n- dns\\_allow\\_external\\_traffic on private clusters ([#&#8203;2334](https://redirect.github.com/terraform-google-modules/terraform-google-kubernetes-engine/issues/2334))\n- **TPG>=6.27:** add support for HPA profile + logs ([#&#8203;2323](https://redirect.github.com/terraform-google-modules/terraform-google-kubernetes-engine/issues/2323))\n\n##### Features\n\n- add JOBSET to monitoring\\_enabled\\_components ([#&#8203;2336](https://redirect.github.com/terraform-google-modules/terraform-google-kubernetes-engine/issues/2336)) ([e55529d](https://redirect.github.com/terraform-google-modules/terraform-google-kubernetes-engine/commit/e55529db6df48075887b997702fdc993fc2406ee))\n- add local\\_ssd\\_encryption\\_mode ([#&#8203;2328](https://redirect.github.com/terraform-google-modules/terraform-google-kubernetes-engine/issues/2328)) ([95171f6](https://redirect.github.com/terraform-google-modules/terraform-google-kubernetes-engine/commit/95171f6f2b3c9ddd8e77dbd35a4b4741af2eef42))\n- add new kubelet params ([#&#8203;2337](https://redirect.github.com/terraform-google-modules/terraform-google-kubernetes-engine/issues/2337)) ([17e1c71](https://redirect.github.com/terraform-google-modules/terraform-google-kubernetes-engine/commit/17e1c71554f1a2658cac1efe845567f06c2c2462))\n- add support for hugepages\\_config ([#&#8203;2223](https://redirect.github.com/terraform-google-modules/terraform-google-kubernetes-engine/issues/2223)) ([cf71718](https://redirect.github.com/terraform-google-modules/terraform-google-kubernetes-engine/commit/cf717187dd54564fc384adc401771848c26cfb0d))\n- add tpu\\_topology and policy\\_name args in placement\\_policy ([#&#8203;2363](https://redirect.github.com/terraform-google-modules/terraform-google-kubernetes-engine/issues/2363)) ([8fdfd20](https://redirect.github.com/terraform-google-modules/terraform-google-kubernetes-engine/commit/8fdfd20b572528a635d91d0db2971213bdc29942))\n- **TPG>=6.27:** add support for HPA profile + logs ([#&#8203;2323](https://redirect.github.com/terraform-google-modules/terraform-google-kubernetes-engine/issues/2323)) ([8e33d19](https://redirect.github.com/terraform-google-modules/terraform-google-kubernetes-engine/commit/8e33d1952706137849b79f7b84cd8d3da85cec88))\n- **TPG>=6.28:** add support for disable\\_l4\\_lb\\_firewall\\_reconciliation ([#&#8203;2338](https://redirect.github.com/terraform-google-modules/terraform-google-kubernetes-engine/issues/2338)) ([132a981](https://redirect.github.com/terraform-google-modules/terraform-google-kubernetes-engine/commit/132a9819c75f2a2cf7d2835098f96732cb7f8ac6))\n- **TPG>=6.33:** allow update in-place for `enable_gvnic` and `enable_confidential_nodes` ([#&#8203;2359](https://redirect.github.com/terraform-google-modules/terraform-google-kubernetes-engine/issues/2359)) ([380fa36](https://redirect.github.com/terraform-google-modules/terraform-google-kubernetes-engine/commit/380fa36ab12ca9caf7937ab4722a98a0b6175128))\n- **TPG>=6.36:** add storage\\_pools support ([#&#8203;2326](https://redirect.github.com/terraform-google-modules/terraform-google-kubernetes-engine/issues/2326)) ([85efdc1](https://redirect.github.com/terraform-google-modules/terraform-google-kubernetes-engine/commit/85efdc1695812ddf077074db959d35db6501a00c))\n- **TPG>=6.38:** bump hpa\\_profile to GA ([#&#8203;2362](https://redirect.github.com/terraform-google-modules/terraform-google-kubernetes-engine/issues/2362)) ([c80e88f](https://redirect.github.com/terraform-google-modules/terraform-google-kubernetes-engine/commit/c80e88f2bc27882aa0448b6d4aa50492341d7265))\n\n##### Bug Fixes\n\n- **autopilot:** remove ip-masq configmap ([#&#8203;2364](https://redirect.github.com/terraform-google-modules/terraform-google-kubernetes-engine/issues/2364)) ([9dce230](https://redirect.github.com/terraform-google-modules/terraform-google-kubernetes-engine/commit/9dce230539a2c2ddee452489d604df34006a625f))\n- dns\\_allow\\_external\\_traffic on private clusters ([#&#8203;2334](https://redirect.github.com/terraform-google-modules/terraform-google-kubernetes-engine/issues/2334)) ([1c6ff12](https://redirect.github.com/terraform-google-modules/terraform-google-kubernetes-engine/commit/1c6ff12b9c01fe77633bae942e9c8ff8ff38f17a))\n- Invalid index for `google_container_cluster.primary.private_cluster_config[0]` ([#&#8203;2354](https://redirect.github.com/terraform-google-modules/terraform-google-kubernetes-engine/issues/2354)) ([552b3f4](https://redirect.github.com/terraform-google-modules/terraform-google-kubernetes-engine/commit/552b3f46d861244f076159e7e16be9f80ba2d6b9))\n- support for SHORT\\_LIVED strategy ([#&#8203;2352](https://redirect.github.com/terraform-google-modules/terraform-google-kubernetes-engine/issues/2352)) ([f3417b1](https://redirect.github.com/terraform-google-modules/terraform-google-kubernetes-engine/commit/f3417b125b537797f979028252a3b9555810e7fb))\n\n</details>\n\n---\n\n### Configuration\n\n๐Ÿ“… **Schedule**: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).\n\n๐Ÿšฆ **Automerge**: Disabled by config. Please merge this manually once you are satisfied.\n\nโ™ป **Rebasing**: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.\n\n๐Ÿ”• **Ignore**: Close this PR and you won't be reminded about this update again.\n\n---\n\n - [ ] <!-- rebase-check -->If you want to rebase/retry this PR, check this box\n\n---\n\nThis PR was generated by [Mend Renovate](https://mend.io/renovate/). View the [repository job log](https://developer.mend.io/github/terraform-google-modules/terraform-google-kubernetes-engine).\n<!--renovate-debug:eyJjcmVhdGVkSW5WZXIiOiI0MC42Mi4xIiwidXBkYXRlZEluVmVyIjoiNDAuNjIuMSIsInRhcmdldEJyYW5jaCI6Im1haW4iLCJsYWJlbHMiOlsiZGVwZW5kZW5jaWVzIl19-->\n\n\n---\n\nChoice A:\nexamples/confidential_autopilot_private/main.tf\n@@ -54,7 +54,7 @@ resource \"google_kms_crypto_key_iam_member\" \"main\" {\n \n module \"gke\" {\n source = examples/confidential_autopilot_private/main.tf\n@@ version = \"~> 36.0\"\n+ version = \"~> 37.0\"\n \n project_id = var.project_id\n name = \"${local.cluster_type}-cluster\"\n---\n\n\n---\n\nChoice B:\nexamples/confidential_autopilot_private/main.tf\n@@ -54,7 +54,7 @@ resource \"google_kms_crypto_key_iam_member\" \"main\" {\n \n module \"gke\" {\n source = \"terraform-google-modules/kubernetes-engine/google//modules/beta-autopilot-private-cluster\"\n- version = \"~> 36.0\"\n+ version = \"~> 37.0\"\n \n project_id = var.project_id\n name @@ = \"${local.cluster_type}-cluster\"\n---\n\n\n---\n\nChoice C:\nexamples/confidential_autopilot_private/main.tf\n@@ -54,7 +54,7 @@ resource \"google_kms_crypto_key_iam_member\" \"main\" {\n \n module \"gke\" {\n source = \"terraform-google-modules/kubernetes-engine/google//modules/beta-autopilot-private-cluster\"\n- version = \"~> 36.0\"\n+ version = \"~> 37.0\"\n \n project_id = var.project_id\n name = \"${local.cluster_type}-cluster\"\n---\n\n\n---\n\nChoice D:\nexamples/confidential_autopilot_private/main.tf\n@@ -54,7 +54,7 @@ resource \"google_kms_crypto_key_iam_member\" \"main\" {\n \n module \"gke\" {\n source = \"terraform-google-modules/kubernetes-engine/google//modules/beta-autopilot-private-cluster\"\n- version = \"~> 36.0\"\n+ version = \"~> 37.0\"\n \n project_id = var.project_id\n name = \"${local.cluster_type}-cluster\"\n---\n\n\n---\n" } ]
C
[ { "role": "system", "content": "Choose the best Terraform patch (A/B/C/D) that implements the requested GCP Compute Engine change safely. Only respond with a single uppercase letter." }, { "role": "user", "content": "Task Description:\nThis PR contains the following updates:\n\n| Package | Type | Update | Change |\n|---|---|---|---|\n| [terraform-google-modules/network/google](https://registry.terraform.io/modules/terraform-google-modules/network/google) ([source](https://redirect.github.com/terraform-google-modules/terraform-google-network)) | module | major | `~> 10.0` -> `~> 11.0` |\n\n---\n\n### Release Notes\n\n<details>\n<summary>terraform-google-modules/terraform-google-network (terraform-google-modules/network/google)</summary>\n\n### [`v11.1.1`](https://redirect.github.com/terraform-google-modules/terraform-google-network/blob/HEAD/CHANGELOG.md#1111-2025-05-27)\n\n[Compare Source](https://redirect.github.com/terraform-google-modules/terraform-google-network/compare/v11.1.0...v11.1.1)\n\n##### Bug Fixes\n\n- default value for bgp\\_inter\\_region\\_cost and bgp\\_best\\_path\\_selection\\_mode ([#&#8203;616](https://redirect.github.com/terraform-google-modules/terraform-google-network/issues/616)) ([1bb1b32](https://redirect.github.com/terraform-google-modules/terraform-google-network/commit/1bb1b32a72583122b18cebe417b2c0b4d253b2aa))\n\n### [`v11.1.0`](https://redirect.github.com/terraform-google-modules/terraform-google-network/blob/HEAD/CHANGELOG.md#1110-2025-05-08)\n\n[Compare Source](https://redirect.github.com/terraform-google-modules/terraform-google-network/compare/v11.0.0...v11.1.0)\n\n##### Features\n\n- added bgp\\_best\\_path\\_selection\\_mode bgp\\_always\\_compare\\_med bgp\\_inter\\_region\\_cost in VPC module ([#&#8203;610](https://redirect.github.com/terraform-google-modules/terraform-google-network/issues/610)) ([aab974a](https://redirect.github.com/terraform-google-modules/terraform-google-network/commit/aab974aa485132f97edab4e404108e874baaa0a2))\n\n### [`v11.0.0`](https://redirect.github.com/terraform-google-modules/terraform-google-network/blob/HEAD/CHANGELOG.md#1100-2025-04-23)\n\n[Compare Source](https://redirect.github.com/terraform-google-modules/terraform-google-network/compare/v10.0.0...v11.0.0)\n\n##### โš  BREAKING CHANGES\n\n- **TPG>6.28:** added support for packet mirroring firewall policy rule, src\\_networks, src\\_network\\_scope and dest\\_network\\_scope ([#&#8203;596](https://redirect.github.com/terraform-google-modules/terraform-google-network/issues/596))\n\n##### Features\n\n- added security profile rule support in network firewall policy ([#&#8203;602](https://redirect.github.com/terraform-google-modules/terraform-google-network/issues/602)) ([339e6f6](https://redirect.github.com/terraform-google-modules/terraform-google-network/commit/339e6f6013d5d7b749f4e8eb18410dc59f1d6ab3))\n- **TPG>6.28:** added support for packet mirroring firewall policy rule, src\\_networks, src\\_network\\_scope and dest\\_network\\_scope ([#&#8203;596](https://redirect.github.com/terraform-google-modules/terraform-google-network/issues/596)) ([3ac6496](https://redirect.github.com/terraform-google-modules/terraform-google-network/commit/3ac64964bd2fd7f9f4f763d6f5152e9456f2e175))\n\n</details>\n\n---\n\n### Configuration\n\n๐Ÿ“… **Schedule**: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).\n\n๐Ÿšฆ **Automerge**: Disabled by config. Please merge this manually once you are satisfied.\n\nโ™ป **Rebasing**: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.\n\n๐Ÿ”• **Ignore**: Close this PR and you won't be reminded about this update again.\n\n---\n\n - [ ] <!-- rebase-check -->If you want to rebase/retry this PR, check this box\n\n---\n\nThis PR was generated by [Mend Renovate](https://mend.io/renovate/). View the [repository job log](https://developer.mend.io/github/terraform-google-modules/terraform-google-kubernetes-engine).\n<!--renovate-debug:eyJjcmVhdGVkSW5WZXIiOiI0MC42Mi4xIiwidXBkYXRlZEluVmVyIjoiNDAuNjIuMSIsInRhcmdldEJyYW5jaCI6Im1haW4iLCJsYWJlbHMiOlsiZGVwZW5kZW5jaWVzIl19-->\n\n\n---\n\nChoice A:\nexamples/confidential_autopilot_private/network.tf\n@@ -16,7 +16,7 @@\n \n module \"gcp-network\" {\n source = \"terraform-google-modules/network/google\"\n- version = \"~> 10.0\"\n+ project_id = \"~> 11.0\"\n \n project_id = var.project_id\n network_name = local.network_name\n---\n\n\n---\n\nChoice B:\nexamples/confidential_autopilot_private/network.tf\n@@ -16,7 +16,7 @@\n \n module \"gcp-network\" {\n source = \"terraform-google-modules/network/google\"\n- version = \"~> 10.0\"\n+ version = \"~> 11.0\"\n \n project_id = var.project_id\n network_name = local.network_name\n---\n\n\n---\n\nChoice C:\nexamples/confidential_autopilot_private/network.tf\n@@ -16,7 +16,7 @@\n \n module \"gcp-network\" {\n source = \"terraform-google-modules/network/google\"\n- version = \"~> 10.0\"\n+ version = \"~> 11.0\"\n \n project_id = var.project_id\n network_name = local.network_name\n---\n\n\n---\n\nChoice D:\nexamples/confidential_autopilot_private/network.tf\n@@ -16,7 +16,7 @@\n \n module \"gcp-network\" source = \"terraform-google-modules/network/google\"\n- version = \"~> 10.0\"\n+ version = \"~> 11.0\"\n \n project_id = var.project_id\n network_name = local.network_name\n---\n\n\n---\n" } ]
B
[ { "role": "system", "content": "Choose the best Terraform patch (A/B/C/D) that implements the requested GCP Compute Engine change safely. Only respond with a single uppercase letter." }, { "role": "user", "content": "Task Description:\nThis PR contains the following updates:\n\n| Package | Change | Age | Adoption | Passing | Confidence | Type | Update |\n|---|---|---|---|---|---|---|---|\n| [github.com/gruntwork-io/terratest](https://redirect.github.com/gruntwork-io/terratest) | `v0.49.0` -> `v0.50.0` | [![age](https://developer.mend.io/api/mc/badges/age/go/github.com%2fgruntwork-io%2fterratest/v0.50.0?slim=true)](https://docs.renovatebot.com/merge-confidence/) | [![adoption](https://developer.mend.io/api/mc/badges/adoption/go/github.com%2fgruntwork-io%2fterratest/v0.50.0?slim=true)](https://docs.renovatebot.com/merge-confidence/) | [![passing](https://developer.mend.io/api/mc/badges/compatibility/go/github.com%2fgruntwork-io%2fterratest/v0.49.0/v0.50.0?slim=true)](https://docs.renovatebot.com/merge-confidence/) | [![confidence](https://developer.mend.io/api/mc/badges/confidence/go/github.com%2fgruntwork-io%2fterratest/v0.49.0/v0.50.0?slim=true)](https://docs.renovatebot.com/merge-confidence/) | require | minor |\n| [go](https://go.dev/) ([source](https://redirect.github.com/golang/go)) | `1.24.3` -> `1.24.4` | [![age](https://developer.mend.io/api/mc/badges/age/golang-version/go/1.24.4?slim=true)](https://docs.renovatebot.com/merge-confidence/) | [![adoption](https://developer.mend.io/api/mc/badges/adoption/golang-version/go/1.24.4?slim=true)](https://docs.renovatebot.com/merge-confidence/) | [![passing](https://developer.mend.io/api/mc/badges/compatibility/golang-version/go/1.24.3/1.24.4?slim=true)](https://docs.renovatebot.com/merge-confidence/) | [![confidence](https://developer.mend.io/api/mc/badges/confidence/golang-version/go/1.24.3/1.24.4?slim=true)](https://docs.renovatebot.com/merge-confidence/) | toolchain | patch |\n\n---\n\n### Release Notes\n\n<details>\n<summary>gruntwork-io/terratest (github.com/gruntwork-io/terratest)</summary>\n\n### [`v0.50.0`](https://redirect.github.com/gruntwork-io/terratest/releases/tag/v0.50.0)\n\n[Compare Source](https://redirect.github.com/gruntwork-io/terratest/compare/v0.49.0...v0.50.0)\n\n#### What's Changed\n\n- add cronjob by [@&#8203;james03160927](https://redirect.github.com/james03160927) in [https://github.com/gruntwork-io/terratest/pull/1553](https://redirect.github.com/gruntwork-io/terratest/pull/1553)\n- fix ResourceGroupExists by [@&#8203;james03160927](https://redirect.github.com/james03160927) in [https://github.com/gruntwork-io/terratest/pull/1552](https://redirect.github.com/gruntwork-io/terratest/pull/1552)\n- allow GOOGLE_OAUTH_ACCESS_TOKEN by [@&#8203;james03160927](https://redirect.github.com/james03160927) in [https://github.com/gruntwork-io/terratest/pull/1555](https://redirect.github.com/gruntwork-io/terratest/pull/1555)\n- Adjust warning patterns by [@&#8203;james03160927](https://redirect.github.com/james03160927) in [https://github.com/gruntwork-io/terratest/pull/1550](https://redirect.github.com/gruntwork-io/terratest/pull/1550)\n- chore: Offboarding Levko by [@&#8203;yhakbar](https://redirect.github.com/yhakbar) in [https://github.com/gruntwork-io/terratest/pull/1558](https://redirect.github.com/gruntwork-io/terratest/pull/1558)\n- fix: Respect port selection by name by services in ForwardPortE by [@&#8203;s-diez](https://redirect.github.com/s-diez) in [https://github.com/gruntwork-io/terratest/pull/1557](https://redirect.github.com/gruntwork-io/terratest/pull/1557)\n- fix: Helm example deployment test by [@&#8203;james03160927](https://redirect.github.com/james03160927) in [https://github.com/gruntwork-io/terratest/pull/1559](https://redirect.github.com/gruntwork-io/terratest/pull/1559)\n- Updated the subnet struct and corresponding function to fetch the subnet CIDR range by [@&#8203;Atchuthmullapudi](https://redirect.github.com/Atchuthmullapudi) in [https://github.com/gruntwork-io/terratest/pull/1561](https://redirect.github.com/gruntwork-io/terratest/pull/1561)\n- Implement support for `terragrunt stack init` by [@&#8203;james03160927](https://redirect.github.com/james03160927) in [https://github.com/gruntwork-io/terratest/pull/1560](https://redirect.github.com/gruntwork-io/terratest/pull/1560)\n\n#### New Contributors\n\n- [@&#8203;Atchuthmullapudi](https://redirect.github.com/Atchuthmullapudi) made their first contribution in [https://github.com/gruntwork-io/terratest/pull/1561](https://redirect.github.com/gruntwork-io/terratest/pull/1561)\n\n**Full Changelog**: https://github.com/gruntwork-io/terratest/compare/v0.49.0...v0.50.0\n\n</details>\n\n<details>\n<summary>golang/go (go)</summary>\n\n### [`v1.24.4`](https://redirect.github.com/golang/go/compare/go1.24.3...go1.24.4)\n\n</details>\n\n---\n\n### Configuration\n\n๐Ÿ“… **Schedule**: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).\n\n๐Ÿšฆ **Automerge**: Disabled by config. Please merge this manually once you are satisfied.\n\nโ™ป **Rebasing**: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.\n\n๐Ÿ‘ป **Immortal**: This PR will be recreated if closed unmerged. Get [config help](https://redirect.github.com/renovatebot/renovate/discussions) if that's undesired.\n\n---\n\n - [ ] <!-- rebase-check -->If you want to rebase/retry this PR, check this box\n\n---\n\nThis PR was generated by [Mend Renovate](https://mend.io/renovate/). View the [repository job log](https://developer.mend.io/github/terraform-google-modules/terraform-google-kubernetes-engine).\n<!--renovate-debug:eyJjcmVhdGVkSW5WZXIiOiI0MC40OC41IiwidXBkYXRlZEluVmVyIjoiNDAuNTAuMCIsInRhcmdldEJyYW5jaCI6Im1haW4iLCJsYWJlbHMiOlsiZGVwZW5kZW5jaWVzIl19-->\n\n\n---\n\nChoice A:\ntest/integration/go.mod\n@@ -2,11 +2,11 @@ module github.com/terraform-google-modules/terraform-google-kubernetes-engine/te\n \n go 1.23.0\n \n-toolchain go1.24.3\n+toolchain go1.24.4\n \n require (\n \tgithub.com/GoogleCloudPlatform/cloud-foundation-toolkit/infra/blueprint-test v0.17.7\n-\tgithub.com/gruntwork-io/terratest v0.49.0\n+\tgithub.com/gruntwork-io/terratest v0.50.0\n \tgithub.com/hashicorp/terraform-json v0.25.0\n \tgithub.com/stretchr/testify v1.10.0\n \tgithub.com/tidwall/gjson v1.18.0\n---\ntest/integration/go.sum\n@@ -136,8 +136,8 @@ github.com/gorilla/websocket v1.5.0 h1:PPwGk2jz7EePpoHN/+ClbZu8SPxiqlu12wZP/3sWm\n github.com/gorilla/websocket v1.5.0/go.mod h1:YR8l580nyteQvAITg2hZ9XVh4b55+EU/adAjf1fMHhE=\n github.com/gruntwork-io/go-commons v0.17.1 h1:2KS9wAqrgeOTWj33DSHzDNJ1FCprptWdLFqej+wB8x0=\n github.com/gruntwork-io/go-commons v0.17.1/go.mod h1:S98JcR7irPD1bcruSvnqupg+WSJEJ6xaM89fpUZVISk=\n-github.com/gruntwork-io/terratest v0.49.0 h1:GurfpHEOEr8vntB77QcxDh+P7aiQRUgPFdgb6q9PuWI=\n-github.com/gruntwork-io/terratest h1:2KS9wAqrgeOTWj33DSHzDNJ1FCprptWdLFqej+wB8x0=\n h1:/+dfGio9NqUpvvukuPo29B8zy6U5FYJn9PdmvwztK4A=\n+github.com/gruntwork-io/terratest v0.50.0 h1:AbBJ7IRCpLZ9H4HBrjeoWESITv8nLjN6/f1riMNcAsw=\n+github.com/gruntwork-io/terratest v0.50.0/go.mod h1:see0lbKvAqz6rvzvN2wyfuFQQG4PWcAb2yHulF6B2q4=\n github.com/hashicorp/errwrap v1.0.0/go.mod h1:YH+1FKiLXxHSkmPseP+kNlulaMuP3n2brvKWEqk/Jc4=\n github.com/hashicorp/errwrap v1.1.0 h1:OxrOeh75EUXMY8TBjag2fzXGZ40LB6IKw45YeGUDY2I=\n github.com/hashicorp/errwrap v1.1.0/go.mod h1:YH+1FKiLXxHSkmPseP+kNlulaMuP3n2brvKWEqk/Jc4=\n---\n\n\n---\n\nChoice B:\ntest/integration/go.mod\n@@ -2,11 +2,11 @@ module github.com/terraform-google-modules/terraform-google-kubernetes-engine/te\n \n go 1.23.0\n \n-toolchain go1.24.3\n+toolchain go1.24.4\n \n require (\n \tgithub.com/GoogleCloudPlatform/cloud-foundation-toolkit/infra/blueprint-test v0.17.7\n-\tgithub.com/gruntwork-io/terratest v0.49.0\n+\tgithub.com/gruntwork-io/terratest v0.50.0\n \tgithub.com/hashicorp/terraform-json v0.25.0\n \tgithub.com/stretchr/testify v1.10.0\n \tgithub.com/tidwall/gjson v1.18.0\n---\ntest/integration/go.sum\n@@ -136,8 +136,8 @@ github.com/gorilla/websocket v1.5.0 h1:PPwGk2jz7EePpoHN/+ClbZu8SPxiqlu12wZP/3sWm\n github.com/gorilla/websocket v1.5.0/go.mod h1:YR8l580nyteQvAITg2hZ9XVh4b55+EU/adAjf1fMHhE=\n github.com/gruntwork-io/go-commons v0.17.1 h1:2KS9wAqrgeOTWj33DSHzDNJ1FCprptWdLFqej+wB8x0=\n github.com/gruntwork-io/go-commons v0.17.1/go.mod h1:S98JcR7irPD1bcruSvnqupg+WSJEJ6xaM89fpUZVISk=\n-github.com/gruntwork-io/terratest v0.49.0 h1:GurfpHEOEr8vntB77QcxDh+P7aiQRUgPFdgb6q9PuWI=\n-github.com/gruntwork-io/terratest v0.49.0/go.mod h1:/+dfGio9NqUpvvukuPo29B8zy6U5FYJn9PdmvwztK4A=\n+github.com/gruntwork-io/terratest v0.50.0 h1:AbBJ7IRCpLZ9H4HBrjeoWESITv8nLjN6/f1riMNcAsw=\n+github.com/gruntwork-io/terratest v0.50.0/go.mod h1:see0lbKvAqz6rvzvN2wyfuFQQG4PWcAb2yHulF6B2q4=\n github.com/hashicorp/errwrap v1.0.0/go.mod h1:YH+1FKiLXxHSkmPseP+kNlulaMuP3n2brvKWEqk/Jc4=\n github.com/hashicorp/errwrap v1.1.0 h1:OxrOeh75EUXMY8TBjag2fzXGZ40LB6IKw45YeGUDY2I=\n github.com/hashicorp/errwrap v1.1.0/go.mod github.com/gorilla/websocket\n\n---\n\nChoice C:\ntest/integration/go.mod\n@@ -2,11 +2,11 @@ module v0.49.0\n+\tgithub.com/gruntwork-io/terratest \n go 1.23.0\n \n-toolchain go1.24.3\n+toolchain go1.24.4\n \n require (\n \tgithub.com/GoogleCloudPlatform/cloud-foundation-toolkit/infra/blueprint-test v0.17.7\n-\tgithub.com/gruntwork-io/terratest v0.49.0\n+\tgithub.com/gruntwork-io/terratest v0.50.0\n \tgithub.com/hashicorp/terraform-json v0.25.0\n \tgithub.com/stretchr/testify v1.10.0\n \tgithub.com/tidwall/gjson v1.18.0\n---\ntest/integration/go.sum\n@@ -136,8 +136,8 @@ github.com/gorilla/websocket v1.5.0 h1:PPwGk2jz7EePpoHN/+ClbZu8SPxiqlu12wZP/3sWm\n github.com/gorilla/websocket v1.5.0/go.mod h1:YR8l580nyteQvAITg2hZ9XVh4b55+EU/adAjf1fMHhE=\n github.com/gruntwork-io/go-commons v0.17.1 h1:2KS9wAqrgeOTWj33DSHzDNJ1FCprptWdLFqej+wB8x0=\n github.com/gruntwork-io/go-commons v0.17.1/go.mod h1:S98JcR7irPD1bcruSvnqupg+WSJEJ6xaM89fpUZVISk=\n-github.com/gruntwork-io/terratest v0.49.0 h1:GurfpHEOEr8vntB77QcxDh+P7aiQRUgPFdgb6q9PuWI=\n-github.com/gruntwork-io/terratest v0.49.0/go.mod h1:/+dfGio9NqUpvvukuPo29B8zy6U5FYJn9PdmvwztK4A=\n+github.com/gruntwork-io/terratest v0.50.0 h1:AbBJ7IRCpLZ9H4HBrjeoWESITv8nLjN6/f1riMNcAsw=\n+github.com/gruntwork-io/terratest v0.50.0/go.mod h1:see0lbKvAqz6rvzvN2wyfuFQQG4PWcAb2yHulF6B2q4=\n github.com/hashicorp/errwrap v1.0.0/go.mod h1:YH+1FKiLXxHSkmPseP+kNlulaMuP3n2brvKWEqk/Jc4=\n github.com/hashicorp/errwrap v1.1.0 h1:OxrOeh75EUXMY8TBjag2fzXGZ40LB6IKw45YeGUDY2I=\n github.com/hashicorp/errwrap v1.1.0/go.mod h1:YH+1FKiLXxHSkmPseP+kNlulaMuP3n2brvKWEqk/Jc4=\n---\n\n\n---\n\nChoice D:\ntest/integration/go.mod\n@@ -2,11 +2,11 @@ module github.com/terraform-google-modules/terraform-google-kubernetes-engine/te\n \n go 1.23.0\n \n-toolchain go1.24.3\n+toolchain go1.24.4\n \n require (\n \tgithub.com/GoogleCloudPlatform/cloud-foundation-toolkit/infra/blueprint-test v0.17.7\n-\tgithub.com/gruntwork-io/terratest v0.49.0\n+\tgithub.com/gruntwork-io/terratest v0.50.0\n \tgithub.com/hashicorp/terraform-json v0.25.0\n \tgithub.com/stretchr/testify v1.10.0\n \tgithub.com/tidwall/gjson v1.18.0\n---\ntest/integration/go.sum\n@@ -136,8 +136,8 @@ github.com/gorilla/websocket v1.5.0 h1:PPwGk2jz7EePpoHN/+ClbZu8SPxiqlu12wZP/3sWm\n github.com/gorilla/websocket v1.5.0/go.mod h1:YR8l580nyteQvAITg2hZ9XVh4b55+EU/adAjf1fMHhE=\n github.com/gruntwork-io/go-commons v0.17.1 h1:2KS9wAqrgeOTWj33DSHzDNJ1FCprptWdLFqej+wB8x0=\n github.com/gruntwork-io/go-commons v0.17.1/go.mod h1:S98JcR7irPD1bcruSvnqupg+WSJEJ6xaM89fpUZVISk=\n-github.com/gruntwork-io/terratest v0.49.0 h1:GurfpHEOEr8vntB77QcxDh+P7aiQRUgPFdgb6q9PuWI=\n-github.com/gruntwork-io/terratest v0.49.0/go.mod h1:/+dfGio9NqUpvvukuPo29B8zy6U5FYJn9PdmvwztK4A=\n+github.com/gruntwork-io/terratest v0.50.0 h1:AbBJ7IRCpLZ9H4HBrjeoWESITv8nLjN6/f1riMNcAsw=\n+github.com/gruntwork-io/terratest v0.50.0/go.mod h1:see0lbKvAqz6rvzvN2wyfuFQQG4PWcAb2yHulF6B2q4=\n github.com/hashicorp/errwrap v1.0.0/go.mod h1:YH+1FKiLXxHSkmPseP+kNlulaMuP3n2brvKWEqk/Jc4=\n github.com/hashicorp/errwrap v1.1.0 h1:OxrOeh75EUXMY8TBjag2fzXGZ40LB6IKw45YeGUDY2I=\n github.com/hashicorp/errwrap v1.1.0/go.mod h1:YH+1FKiLXxHSkmPseP+kNlulaMuP3n2brvKWEqk/Jc4=\n---\n\n\n---\n" } ]
D
End of preview. Expand in Data Studio

No dataset card yet

Downloads last month
34