From 584437a7f6cd7d16ef150b78eaee887adc5286da Mon Sep 17 00:00:00 2001 From: Menna Tullah Magdy Taha Date: Wed, 6 Mar 2024 14:33:37 +0100 Subject: [PATCH] Edited variable --- .github/workflows/terraform.yml | 44 --------------------------------- providers.tf | 1 - 2 files changed, 45 deletions(-) diff --git a/.github/workflows/terraform.yml b/.github/workflows/terraform.yml index 8c3a67d..fbd4fd3 100644 --- a/.github/workflows/terraform.yml +++ b/.github/workflows/terraform.yml @@ -1,47 +1,3 @@ -# This workflow installs the latest version of Terraform CLI and configures the Terraform CLI configuration file -# with an API token for Terraform Cloud (app.terraform.io). On pull request events, this workflow will run -# `terraform init`, `terraform fmt`, and `terraform plan` (speculative plan via Terraform Cloud). On push events -# to the "main" branch, `terraform apply` will be executed. -# -# Documentation for `hashicorp/setup-terraform` is located here: https://github.com/hashicorp/setup-terraform -# -# To use this workflow, you will need to complete the following setup steps. -# -# 1. Create a `main.tf` file in the root of this repository with the `remote` backend and one or more resources defined. -# Example `main.tf`: -# # The configuration for the `remote` backend. -# terraform { -# backend "remote" { -# # The name of your Terraform Cloud organization. -# organization = "example-organization" -# -# # The name of the Terraform Cloud workspace to store Terraform state files in. -# workspaces { -# name = "example-workspace" -# } -# } -# } -# -# # An example resource that does nothing. -# resource "null_resource" "example" { -# triggers = { -# value = "A example resource that does nothing!" -# } -# } -# -# -# 2. Generate a Terraform Cloud user API token and store it as a GitHub secret (e.g. TF_API_TOKEN) on this repository. -# Documentation: -# - https://www.terraform.io/docs/cloud/users-teams-organizations/api-tokens.html -# - https://help.github.com/en/actions/configuring-and-managing-workflows/creating-and-storing-encrypted-secrets -# -# 3. Reference the GitHub secret in step using the `hashicorp/setup-terraform` GitHub Action. -# Example: -# - name: Setup Terraform -# uses: hashicorp/setup-terraform@v1 -# with: -# cli_config_credentials_token: ${{ secrets.TF_API_TOKEN }} - name: "Terraform" on: diff --git a/providers.tf b/providers.tf index 419c0aa..1b6a56c 100644 --- a/providers.tf +++ b/providers.tf @@ -1,5 +1,4 @@ provider "google" { - credentials = file(var.gcp_credentials) project = var.gcp_project_id region = var.gcp_region }