Releases: hashicorp/terraform-provider-consul
Releases · hashicorp/terraform-provider-consul
v2.21.0
v2.20.0
v2.19.0
2.19.0 (October 25, 2023)
NEW FEATURES
- The
consul_config_entry_service_router
resource can now be used to manage a Service Router config entry (#369). - The
consul_config_entry_service_resolver
resource can now be used to manage a Service Resolver config entry (#368). - The
consul_config_entry_service_intentions
resource can now be used to manage a Service Intention config entry (#367). - The
consul_config_entry_service_defaults
resource can now be used to manage a Service Defaults config entry (#366). - The
consul_config_entry_service_splitter
resource can now be used to manage a Service Splitter config entry (#364). - The
consul_acl_role_policy_attachment
resource can be used to attach a policy to a role created outside the Terraform configuration (#362). - The
consul_acl_token
andconsul_acl_role
resource now supports templated policies (#358). - The
policies
argument of theconsul_acl_role
resource now accept both a policy ID and a policy name (#363).
CHANGES:
- The
consul_config_entry
resource now ignore changes to theStatus
field forhttp-route
,tcp-route
andapi-gateway
config entries (#361)
v2.18.0
NEW FEATURES
- The provider can now use Terraform Cloud Workload Identity to connect to Consul using the
use_terraform_cloud_workload_identity
argument in the provider configuration [#342]. - The
consul_config_entry
resource now supports thejwt-provider
configuration entries [#349]. - The
consul_prepared_query
resource can now specifytargets
in their configuration [#340]. - The
consul_prepared_query
resource can now specifyremove_empty_tags
in their configuration [#312]. - The
consul_certificate_authority
now supports theconfig_json
argument to set complex configuration [#341].
CHANGES:
v2.17.0
CHANGES:
- The
token
argument in the resources and datasources has been deprecated. Thetoken
argument in the provider configuration should be used instead ([#332] and [#298]).
NEW FEATURES:
- The
consul_config_entry
datasource can now be used to read the configuration of a given config entry ([#318]).
IMPROVEMENTS:
- The
consul_node
resource can now be imported ([#323]). - The
consul_config_entry
resource can now be imported ([Gh-319] and [#316]). - The
consul_peering
resource has been updated to support the changes in Consul 1.14 ([#328]). - The
consul_peering
,consul_peerings
datasources have been updated to support the changes in Consul 1.14 ([#328]). - The
consul_config_entry
resource now support the new peer parameters introduced in Consul 1.14 ([#328]).
v2.16.2
NEW FEATURES:
- The
consul_peering
andconsul_peering_token
resources can now be used to manage Consul Cluster Peering configuration (#309). - The
consul_peering
andconsul_peerings
datasources can now be used to introspect Consul Cluster Peering configuration (#309).
IMPROVEMENTS:
- The
consul_acl_token_secret_id
datasource now supports reading tokens in a Consul Admin Partition (#315).
v2.16.1
NEW FEATURES:
- The
consul_peering
andconsul_peering_token
resources can now be used to manage Consul Cluster Peering configuration (#309). - The
consul_peering
andconsul_peerings
datasources can now be used to introspect Consul Cluster Peering configuration (#309).
IMPROVEMENTS:
- The
consul_acl_token_secret_id
datasource now supports reading tokens in a Consul Admin Partition (#315).
v2.16.0
NEW FEATURES:
- The
consul_peering
andconsul_peering_token
resources can now be used to manage Consul Cluster Peering configuration (#309). - The
consul_peering
andconsul_peerings
datasources can now be used to introspect Consul Cluster Peering configuration (#309).
IMPROVEMENTS:
- The
consul_acl_token_secret_id
datasource now supports reading tokens in a Consul Admin Partition (#315).
v2.15.1
BUG FIXES:
- The support of Admin Partition has been fixed for
consul_config_entry
: a newpartition
argument is now present and should be used instead of settingPartition
inconfig_json
.