From f1c6f56cf002d76a09e694c960950ebcb5b540aa Mon Sep 17 00:00:00 2001 From: Amanda Karina Lopes de Oliveira Date: Fri, 30 Sep 2022 17:34:01 -0300 Subject: [PATCH] fixes requirements section place (#61) Adds Requirements in secure-cloud-run-security sub-module --- modules/secure-cloud-run-security/README.md | 54 ++++++++++----------- 1 file changed, 27 insertions(+), 27 deletions(-) diff --git a/modules/secure-cloud-run-security/README.md b/modules/secure-cloud-run-security/README.md index 28fea738..a8ef0ead 100644 --- a/modules/secure-cloud-run-security/README.md +++ b/modules/secure-cloud-run-security/README.md @@ -10,33 +10,6 @@ to be used by Cloud Run. * Allow Ingress only from internal and Cloud Load Balancing. * Allow VPC Egress to Private Ranges Only. -## Requirements - -### Software - -The following dependencies must be available: - -* [Terraform](https://www.terraform.io/downloads.html) >= 0.13.0 -* [Terraform Provider for GCP][terraform-provider-gcp] plugin v3.53 - -### APIs - -A project with the following APIs enabled must be used to host the -resources of this module: - -* KMS Project - * Google Cloud Key Management Service: `cloudkms.googleapis.com` - -### Service Account - -A service account with the following roles must be used to provision -the resources of this module: - -* KMS Project - * Cloud KMS Admin: `roles/cloudkms.admin` -* Serverless Project - * Organization Policy Administrator: `roles/orgpolicy.policyAdmin` - ## Usage ```hcl @@ -92,3 +65,30 @@ module "cloud_run_security" { | keyring\_self\_link | Self link of the keyring. | + +## Requirements + +### Software + +The following dependencies must be available: + +* [Terraform](https://www.terraform.io/downloads.html) >= 0.13.0 +* [Terraform Provider for GCP](https://github.com/terraform-providers/terraform-provider-google) < 5.0 + +### APIs + +A project with the following APIs enabled must be used to host the +resources of this module: + +* KMS Project + * Google Cloud Key Management Service: `cloudkms.googleapis.com` + +### Service Account + +A service account with the following roles must be used to provision +the resources of this module: + +* KMS Project + * Cloud KMS Admin: `roles/cloudkms.admin` +* Serverless Project + * Organization Policy Administrator: `roles/orgpolicy.policyAdmin`