chore(deps): update terraform consul to v2.17.0 #44
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
2.15.1
->2.17.0
Release Notes
hashicorp/terraform-provider-consul (consul)
v2.17.0
Compare Source
CHANGES:
token
argument in the resources and datasources has been deprecated. Thetoken
argument in the provider configuration should be used instead ([#332] and [#298]).NEW FEATURES:
consul_config_entry
datasource can now be used to read the configuration of a given config entry ([#318]).IMPROVEMENTS:
consul_node
resource can now be imported ([#323]).consul_config_entry
resource can now be imported ([Gh-319] and [#316]).consul_peering
resource has been updated to support the changes in Consul 1.14 ([#328]).consul_peering
,consul_peerings
datasources have been updated to support the changes in Consul 1.14 ([#328]).consul_config_entry
resource now support the new peer parameters introduced in Consul 1.14 ([#328]).v2.16.2
Compare Source
NEW FEATURES:
consul_peering
andconsul_peering_token
resources can now be used to manage Consul Cluster Peering configuration (#309).consul_peering
andconsul_peerings
datasources can now be used to introspect Consul Cluster Peering configuration (#309).IMPROVEMENTS:
consul_acl_token_secret_id
datasource now supports reading tokens in a Consul Admin Partition (#315).2.15.1 (April 11, 2022)
BUG FIXES:
consul_config_entry
: a newpartition
argument is now present and should be used instead of settingPartition
inconfig_json
.2.15.0 (March 21, 2022)
CHANGES:
consul_license
resource is now deprecated and will be removed in a future version of the provider (#292).NEW FEATURES:
consul_admin_partition
resource can now be used to manage Consul Admin Partitions (#292).consul_datacenters
datasource can now be used to get the list of known datacenters (#290 and #293).consul_config_entry
now supports themesh
andexported-services
kinds (#292).IMPROVEMENTS:
The
consul_acl_auth_method
,consul_acl_binding_rule
,consul_acl_policy
,consul_acl_role
,consul_acl_token
,consul_key_prefix
,consul_keys
,consul_namespace
andconsul_node
can now manage resources in Admin Partitions (#292).The
consul_acl_auth_method
,consul_acl_policy
,consul_acl_role
,consul_acl_token
,consul_key_prefix
andconsul_keys
datasources can now look for a resource in a specific Admin Partition (#292).2.14.0 (October 01, 2021)
IMPROVEMENTS:
consul_acl_role
resource now has anode_identities
argument (#284 and #287).consul_acl_role
datasource now has anode_identities
attribute (#284 and #287).consul_acl_token
resource now supportsservice_identities
,node_identities
, andexpiration_time
arguments (#284 and #287).consul_acl_token
datasource now supportsroles
,service_identities
,node_identities
, andexpiration_time
attributes (#284 and #287).2.13.0 (August 19, 2021)
NEW FEATURES:
consul_namespace_policy_attachment
and theconsul_namespace_role_attachment
can now be used to attach a default policy or role to an already existing Consul namespace (#247 and #267).header
block in the provider configuration (#245).IMPROVEMENTS:
consul_namespace
resource can now be imported (#247 and #263).tags
attribute in theconsul_services
datasource that was previously documented but missing is now present (#274).BUG FIXES:
consul_service
now properly detect drift in the health-check configuration (#237 and #262).consul_acl_auth_method
is now deferred until read to unsure the configuration has been interpolated (#260 and #261).2.12.0 (May 12, 2021)
NEW FEATURES:
consul_acl_token_role_attachment
can be used to attach a role to a token created outside the Terraform configuration (#252).IMPROVEMENTS:
consul_acl_token_secret_id
datasource can now look for a token in a namespace (#242).Content-Type
header is now present in allPUT
andPOST
HTTP requests sent by the provider (#255).consul_config_entry
can now asssociate a config entry with a namespace (#246 and #256).consul_key_prefix
can now be used to manage keys at the root of the key-value store (#258).BUG FIXES:
consul_acl_auth_method
now correctly detects changes in the configuration (#240 and #244).datacenter
,token
andnamespace
configuration from the provider when they are not set in the resource (#8 and #259)2.11.0 (January 14, 2021)
NEW FEATURES:
consul_config_entry
can now be used to manage Consul service intentions ([#232] and [#235]).2.10.1 (October 22, 2020)
BUG FIXES:
2.10.0 (September 18, 2020)
NEW FEATURES:
consul_intention
resource now has adatacenter
argument ([#213] and [#214]).consul_intention
resource can now be imported ([#222] and [#225]).BUG FIXES:
consul_acl_binding_rule
now delegates the validation ofbind_type
to Consul and supports thenode
bind type ([#217] and [#218]).CONSUL_HTTP_SSL
environment variable can now be used to force the use of SSL like it does for the Consul CLI ([#215] and [#219]).flags
attribute has been removed from theconsul_license
resource to make it work with Consul 1.8 ([#223] and [#227]).2.9.0 (July 23, 2020)
NEW FEATURES:
The new
consul_certificate_authority
can be used to manage the Consul Connect Certificate Authority ([#205]).consul_acl_auth_method
now supports thedisplay_name
,max_token_ttl
,token_locality
andnamespace_rule
attributes ([#204]).The
consul_service
andconsul_service_health
data sources now support filter expressions ([#203]).The
consul_config_entry
resource now support Ingress and Terminating Gateways ([#199] and [#202]).The
consul_service
resource now has aenable_tag_override
attribute ([#201]).The
consul_acl_auth_method
resource now has aconfig_json
attribute to use an arbitrary complex configuration. Theconfig
attribute has been deprecated and will be removed in a future release ([#208] and [#209]).The
consul_acl_auth_method
data source now has aconfig_json
attribute. Theconfig
attribute has been deprecated as it will be blank when the configuration is too complex and it will be removed in a future release ([#208] and [#209]).2.8.0 (May 21, 2020)
NEW FEATURES:
ignore_check_ids
,node_meta
andservice_meta
have been added to theconsul_prepared_query
resource ([#192] and [#193]).BUG FIXES:
subkey
attribute of theconsul_key_prefix
resource now detects external changes ([#189]).2.7.0 (March 26, 2020)
NEW FEATURES:
consul_acl_role
can now be imported ([#182]).consul_acl_token
using the newroles
attribute ([#178] and [#180]]).consul_namespace
resource can now be used to manage namespaces in a Consul Enterprise cluster ([#183]).consul_acl_auth_method
,consul_acl_binding_rule
,consul_acl_policy
,consul_acl_role
,consul_acl_token
,consul_intention
,consul_key_prefix
,consul_keys
andconsul_service
can now be associated to a namespace in a Consul Enterprise cluster ([#183]).consul_acl_auth_method
,consul_acl_policy
,consul_acl_role
,consul_acl_token
,consul_key_prefix
,consul_keys
,consul_nodes
,consul_service
,consul_services
datasources can now be used to query a specific namespace in a Consul Enterprise cluster ([#183]).consul_license
resource can now be used to manage automatically the license of a Consul Enterprise cluster ([#172] and [#173]).consul_network_area
andconsul_network_area_members
can now be used to manage the network areas of a Consul Enterprise cluster ([#175]).consul_network_segments
can now be used to manage the network segments of a Consul Enterprise cluster ([#175]).BUG FIXES:
consul_key_prefix
no longer delete and replace all keys ([#169] and [#171]).2.6.1 (December 07, 2019)
IMPROVEMENTS:
consul_keys
diffs are now easier to read.BUG FIXES:
CONSUL_CLIENT_CERT
,CONSUL_CLIENT_KEY
,CONSUL_CACERT
andCONSUL_CAPATH
are now used to set the TLS configuration of the provider.consul_keys
can now create keys with an empty string as value.2.6.0 (October 25, 2019)
NEW FEATURES:
The
consul_acl_role
,consul_acl_auth_method
andconsul_acl_binding_rule
can now be used to manage the Consul ACL system ([#128] and [#123]).The
consul_acl_token_policy_attachment
can be used to attach a policy to a token created outside the Terraform configuration ([#130] and [#125]).The
consul_config_entry
can now be used to manage Consul Configuration Entries ([#127]).The
consul_acl_auth_method
,consul_acl_policy
,consul_acl_role
datasources can now be used to retrieve information about the Consul ACL objects ([#153]).The
consul_acl_token
can now be used to read public token information ([#137] and [#126]).The
consul_acl_token_secret_id
can now be used to read a token secret ID ([#137] and [#126]).IMPROVEMENTS:
The
consul_service
resource can now set the service metadata ([#122]).The
consul_service
datasource now returns the service metadata ([#148] and [#132]).BUG FIXES:
The
consul_prepared_query
now handles default values correctly for thefailover
,dns
andtemplate
blocks ([#119] and [#121])The
consul_service
resource correctly associates a service instance with its health-checks ([#147] and [#146]).Fix the
check_id
andstatus
attribute of health-checks in theconsul_service
resources that would always mark the plan as dirty ([#142]).2.5.0 (June 03, 2019)
NEW FEATURES:
2.4.0 (May 29, 2019)
NEW FEATURES:
consul_service_health
can now be used to fetch healthy instances of a service ([#87] and [#89])IMPROVEMENTS:
consul_prepared_query
resource now supports Consul Connect ([#107])consul_acl_token
andconsul_acl_policy
resources are now importable ([#103])BUG FIXES:
failover
,dns
andtemplate
of theconsul_prepared_query
resource are now set correctly ([#109] and [#108])consul_acl_token
resource can now be updated and does not crashes Terraform anymore ([#102])consul_node
resource now detect external changes made to itsaddress
andmeta
attributes ([#104])external
attribute of theconsul_service
resource has been deprecated ([#104])local
attribute is now correctly marked as requiring the creation of a new ACL token in theconsul_acl_token
resource ([#117])2.3.0 (April 09, 2019)
NEW FEATURES:
consul_acl_policy
andconsul_acl_token
can now be used to manage Consul ACLs with Terraform. ([!60])consul_autopilot_config
resource can now be used to manage the Consul Autopilot configuration ([!86]).consul_autopilot_health
datasource returns the autopilot health information of the Consul cluster ([!84])IMPROVEMENTS:
consul_service
can now manage health-checks associated with the service. ([!64] and [#54])ca_path
attribute of the provider configuration can now be used to indicate a directory containing certificate files. ([!80] and [!79])consul_prepared_query
resource can now be imported. ([!94])consul_key_prefix
resource can now be imported. ([!78] and [#77])consul_keys
andconsul_key_prefix
can now manage flags associated with each key. ([!71] and [#59])BUG FIXES:
consul_intention
,consul_node
andconsul_service
now correctly re-createsresources deleted out-of-band (#81 and !69).
2.2.0 (October 03, 2018)
IMPROVEMENTS:
consul_node
resource now supports setting node metadata via themeta
attribute. (#65)2.1.0 (June 26, 2018)
NEW FEATURES:
consul_intention
. This provides management of intentions in Consul Connect, used for service authorization. (#53)2.0.0 (June 22, 2018)
NOTES:
consul_catalog_entry
resource has been deprecated and will be removed in a future release. Please use the upgrade guide in the documentation to migrate toconsul_service
orconsul_node
as appropriate. (#49)consul_agent_service
resource has been deprecated and will be removed in a future release. Please use the upgrade guide in the documentation to migrate toconsul_service
. (#49)consul_agent_self
datasource has been deprecated and will be removed in a future release. Please use the upgrade guide in the documentation to migrate toconsul_agent_config
if applicable. (#49)IMPROVEMENTS:
consul_service
resource has been modified to use the Consul catalog APIs. Thenode
attribute is now required, and nodes that do not exist will not be created automatically. Please see the upgrade guide in the documentation for more detail. (#49)consul_catalog_*
data sources have been renamed to remove catalog, for clarity. Both will work going forward, with the catalog version potentially being deprecated on a future date. (#49)1.1.0 (June 15, 2018)
NOTES:
multiple resources. These changes are primarily to simplify overlap of resource functionality, ensure we are using the correct APIs/design provided by Consul for something like Terraform, and remove resources that can no longer be supported by the current version of the Consul API (1.0+). Read more here.
IMPROVEMENTS:
insecure_https
option. (#31)NEW FEATURES:
consul_agent_config
. This new datasource provides information similar toconsul_agent_self
,but is designed to only expose configuration that Consul will not change without versioning upstream. (#42)
consul_key_prefix
corresponds to the existing resource of the same name, allowing config to access a set of keys with a common prefix as a Terraform map for more convenient access (#34)BUG FIXES:
consul_catalog
resource now correctly re-creates resources deleted out-of-band. (#30)consul_service
resource type now correctly detects when a service has been deleted outside of Terraform, flagging it for re-creation rather than returning an error (#33)consul_catalog_service
data source now accepts thetag
anddatacenter
arguments, as was described in documentation (#32)1.0.0 (September 26, 2017)
BUG FIXES:
enable_ui
config setting was always set to false, regardless of the actual agent configuration (#16)0.1.0 (June 20, 2017)
NOTES:
v2.16.1
Compare Source
NEW FEATURES:
consul_peering
andconsul_peering_token
resources can now be used to manage Consul Cluster Peering configuration (#309).consul_peering
andconsul_peerings
datasources can now be used to introspect Consul Cluster Peering configuration (#309).IMPROVEMENTS:
consul_acl_token_secret_id
datasource now supports reading tokens in a Consul Admin Partition (#315).2.15.1 (April 11, 2022)
BUG FIXES:
consul_config_entry
: a newpartition
argument is now present and should be used instead of settingPartition
inconfig_json
.2.15.0 (March 21, 2022)
CHANGES:
consul_license
resource is now deprecated and will be removed in a future version of the provider (#292).NEW FEATURES:
consul_admin_partition
resource can now be used to manage Consul Admin Partitions (#292).consul_datacenters
datasource can now be used to get the list of known datacenters (#290 and #293).consul_config_entry
now supports themesh
andexported-services
kinds (#292).IMPROVEMENTS:
The
consul_acl_auth_method
,consul_acl_binding_rule
,consul_acl_policy
,consul_acl_role
,consul_acl_token
,consul_key_prefix
,consul_keys
,consul_namespace
andconsul_node
can now manage resources in Admin Partitions (#292).The
consul_acl_auth_method
,consul_acl_policy
,consul_acl_role
,consul_acl_token
,consul_key_prefix
andconsul_keys
datasources can now look for a resource in a specific Admin Partition (#292).2.14.0 (October 01, 2021)
IMPROVEMENTS:
consul_acl_role
resource now has anode_identities
argument (#284 and #287).consul_acl_role
datasource now has anode_identities
attribute (#284 and #287).consul_acl_token
resource now supportsservice_identities
,node_identities
, andexpiration_time
arguments (#284 and #287).consul_acl_token
datasource now supportsroles
,service_identities
,node_identities
, andexpiration_time
attributes (#284 and #287).2.13.0 (August 19, 2021)
NEW FEATURES:
consul_namespace_policy_attachment
and theconsul_namespace_role_attachment
can now be used to attach a default policy or role to an already existing Consul namespace (#247 and #267).header
block in the provider configuration (#245).IMPROVEMENTS:
consul_namespace
resource can now be imported (#247 and #263).tags
attribute in theconsul_services
datasource that was previously documented but missing is now present (#274).BUG FIXES:
consul_service
now properly detect drift in the health-check configuration (#237 and #262).consul_acl_auth_method
is now deferred until read to unsure the configuration has been interpolated (#260 and #261).2.12.0 (May 12, 2021)
NEW FEATURES:
consul_acl_token_role_attachment
can be used to attach a role to a token created outside the Terraform configuration (#252).IMPROVEMENTS:
consul_acl_token_secret_id
datasource can now look for a token in a namespace (#242).Content-Type
header is now present in allPUT
andPOST
HTTP requests sent by the provider (#255).consul_config_entry
can now asssociate a config entry with a namespace (#246 and #256).consul_key_prefix
can now be used to manage keys at the root of the key-value store (#258).BUG FIXES:
consul_acl_auth_method
now correctly detects changes in the configuration (#240 and #244).datacenter
,token
andnamespace
configuration from the provider when they are not set in the resource (#8 and #259)2.11.0 (January 14, 2021)
NEW FEATURES:
consul_config_entry
can now be used to manage Consul service intentions ([#232] and [#235]).2.10.1 (October 22, 2020)
BUG FIXES:
2.10.0 (September 18, 2020)
NEW FEATURES:
consul_intention
resource now has adatacenter
argument ([#213] and [#214]).consul_intention
resource can now be imported ([#222] and [#225]).BUG FIXES:
consul_acl_binding_rule
now delegates the validation ofbind_type
to Consul and supports thenode
bind type ([#217] and [#218]).CONSUL_HTTP_SSL
environment variable can now be used to force the use of SSL like it does for the Consul CLI ([#215] and [#219]).flags
attribute has been removed from theconsul_license
resource to make it work with Consul 1.8 ([#223] and [#227]).2.9.0 (July 23, 2020)
NEW FEATURES:
The new
consul_certificate_authority
can be used to manage the Consul Connect Certificate Authority ([#205]).consul_acl_auth_method
now supports thedisplay_name
,max_token_ttl
,token_locality
andnamespace_rule
attributes ([#204]).The
consul_service
andconsul_service_health
data sources now support filter expressions ([#203]).The
consul_config_entry
resource now support Ingress and Terminating Gateways ([#199] and [#202]).The
consul_service
resource now has aenable_tag_override
attribute ([#201]).The
consul_acl_auth_method
resource now has aconfig_json
attribute to use an arbitrary complex configuration. Theconfig
attribute has been deprecated and will be removed in a future release ([#208] and [#209]).The
consul_acl_auth_method
data source now has aconfig_json
attribute. Theconfig
attribute has been deprecated as it will be blank when the configuration is too complex and it will be removed in a future release ([#208] and [#209]).2.8.0 (May 21, 2020)
NEW FEATURES:
ignore_check_ids
,node_meta
andservice_meta
have been added to theconsul_prepared_query
resource ([#192] and [#193]).BUG FIXES:
subkey
attribute of theconsul_key_prefix
resource now detects external changes ([#189]).2.7.0 (March 26, 2020)
NEW FEATURES:
consul_acl_role
can now be imported ([#182]).consul_acl_token
using the newroles
attribute ([#178] and [#180]]).consul_namespace
resource can now be used to manage namespaces in a Consul Enterprise cluster ([#183]).consul_acl_auth_method
,consul_acl_binding_rule
,consul_acl_policy
,consul_acl_role
,consul_acl_token
,consul_intention
,consul_key_prefix
,consul_keys
andconsul_service
can now be associated to a namespace in a Consul Enterprise cluster ([#183]).consul_acl_auth_method
,consul_acl_policy
,consul_acl_role
,consul_acl_token
,consul_key_prefix
,consul_keys
,consul_nodes
,consul_service
,consul_services
datasources can now be used to query a specific namespace in a Consul Enterprise cluster ([#183]).consul_license
resource can now be used to manage automatically the license of a Consul Enterprise cluster ([#172] and [#173]).consul_network_area
andconsul_network_area_members
can now be used to manage the network areas of a Consul Enterprise cluster ([#175]).consul_network_segments
can now be used to manage the network segments of a Consul Enterprise cluster ([#175]).BUG FIXES:
consul_key_prefix
no longer delete and replace all keys ([#169] and [#171]).2.6.1 (December 07, 2019)
IMPROVEMENTS:
consul_keys
diffs are now easier to read.BUG FIXES:
CONSUL_CLIENT_CERT
,CONSUL_CLIENT_KEY
,CONSUL_CACERT
andCONSUL_CAPATH
are now used to set the TLS configuration of the provider.consul_keys
can now create keys with an empty string as value.2.6.0 (October 25, 2019)
NEW FEATURES:
The
consul_acl_role
,consul_acl_auth_method
andconsul_acl_binding_rule
can now be used to manage the Consul ACL system ([#128] and [#123]).The
consul_acl_token_policy_attachment
can be used to attach a policy to a token created outside the Terraform configuration ([#130] and [#125]).The
consul_config_entry
can now be used to manage Consul Configuration Entries ([#127]).The
consul_acl_auth_method
,consul_acl_policy
,consul_acl_role
datasources can now be used to retrieve information about the Consul ACL objects ([#153]).The
consul_acl_token
can now be used to read public token information ([#137] and [#126]).The
consul_acl_token_secret_id
can now be used to read a token secret ID ([#137] and [#126]).IMPROVEMENTS:
The
consul_service
resource can now set the service metadata ([#122]).The
consul_service
datasource now returns the service metadata ([#148] and [#132]).BUG FIXES:
The
consul_prepared_query
now handles default values correctly for thefailover
,dns
andtemplate
blocks ([#119] and [#121])The
consul_service
resource correctly associates a service instance with its health-checks ([#147] and [#146]).Fix the
check_id
andstatus
attribute of health-checks in theconsul_service
resources that would always mark the plan as dirty ([#142]).2.5.0 (June 03, 2019)
NEW FEATURES:
2.4.0 (May 29, 2019)
NEW FEATURES:
consul_service_health
can now be used to fetch healthy instances of a service ([#87] and [#89])IMPROVEMENTS:
consul_prepared_query
resource now supports Consul Connect ([#107])consul_acl_token
andconsul_acl_policy
resources are now importable ([#103])BUG FIXES:
failover
,dns
andtemplate
of theconsul_prepared_query
resource are now set correctly ([#109] and [#108])consul_acl_token
resource can now be updated and does not crashes Terraform anymore ([#102])consul_node
resource now detect external changes made to itsaddress
andmeta
attributes ([#104])external
attribute of theconsul_service
resource has been deprecated ([#104])local
attribute is now correctly marked as requiring the creation of a new ACL token in theconsul_acl_token
resource ([#117])2.3.0 (April 09, 2019)
NEW FEATURES:
consul_acl_policy
andconsul_acl_token
can now be used to manage Consul ACLs with Terraform. ([!60])consul_autopilot_config
resource can now be used to manage the Consul Autopilot configuration ([!86]).consul_autopilot_health
datasource returns the autopilot health information of the Consul cluster ([!84])IMPROVEMENTS:
consul_service
can now manage health-checks associated with the service. ([!64] and [#54])ca_path
attribute of the provider configuration can now be used to indicate a directory containing certificate files. ([!80] and [!79])consul_prepared_query
resource can now be imported. ([!94])consul_key_prefix
resource can now be imported. ([!78] and [#77])consul_keys
andconsul_key_prefix
can now manage flags associated with each key. ([!71] and [#59])BUG FIXES:
consul_intention
,consul_node
andconsul_service
now correctly re-createsresources deleted out-of-band (#81 and !69).
2.2.0 (October 03, 2018)
IMPROVEMENTS:
consul_node
resource now supports setting node metadata via themeta
attribute. (#65)2.1.0 (June 26, 2018)
NEW FEATURES:
consul_intention
. This provides management of intentions in Consul Connect, used for service authorization. (#53)2.0.0 (June 22, 2018)
NOTES:
consul_catalog_entry
resource has been deprecated and will be removed in a future release. Please use the upgrade guide in the documentation to migrate toconsul_service
orconsul_node
as appropriate. (#49)consul_agent_service
resource has been deprecated and will be removed in a future release. Please use the upgrade guide in the documentation to migrate toconsul_service
. (#49)consul_agent_self
datasource has been deprecated and will be removed in a future release. Please use the upgrade guide in the documentation to migrate toconsul_agent_config
if applicable. (#49)IMPROVEMENTS:
consul_service
resource has been modified to use the Consul catalog APIs. Thenode
attribute is now required, and nodes that do not exist will not be created automatically. Please see the upgrade guide in the documentation for more detail. (#49)consul_catalog_*
data sources have been renamed to remove catalog, for clarity. Both will work going forward, with the catalog version potentially being deprecated on a future date. (#49)1.1.0 (June 15, 2018)
NOTES:
multiple resources. These changes are primarily to simplify overlap of resource functionality, ensure we are using the correct APIs/design provided by Consul for something like Terraform, and remove resources that can no longer be supported by the current version of the Consul API (1.0+). Read more here.
IMPROVEMENTS:
insecure_https
option. (#31)NEW FEATURES:
consul_agent_config
. This new datasource provides information similar toconsul_agent_self
,but is designed to only expose configuration that Consul will not change without versioning upstream. (#42)
consul_key_prefix
corresponds to the existing resource of the same name, allowing config to access a set of keys with a common prefix as a Terraform map for more convenient access (#34)BUG FIXES:
consul_catalog
resource now correctly re-creates resources deleted out-of-band. (#30)consul_service
resource type now correctly detects when a service has been deleted outside of Terraform, flagging it for re-creation rather than returning an error (#33)consul_catalog_service
data source now accepts thetag
anddatacenter
arguments, as was described in documentation (#32)1.0.0 (September 26, 2017)
BUG FIXES:
enable_ui
config setting was always set to false, regardless of the actual agent configuration (#16)0.1.0 (June 20, 2017)
NOTES:
v2.16.0
Compare Source
NEW FEATURES:
consul_peering
andconsul_peering_token
resources can now be used to manage Consul Cluster Peering configuration (#309).consul_peering
andconsul_peerings
datasources can now be used to introspect Consul Cluster Peering configuration (#309).IMPROVEMENTS:
consul_acl_token_secret_id
datasource now supports reading tokens in a Consul Admin Partition (#315).Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Mend Renovate. View repository job log here.