From c8bf7891e04fef9b4e714e92002a566e0d816d98 Mon Sep 17 00:00:00 2001 From: Danielle Barda Date: Tue, 1 Aug 2023 13:16:31 +0300 Subject: [PATCH] Release 1.2.0 * Change example links * Update the CHANGELOG file --- CHANGELOG.md | 22 ++++++++++++++++++++++ docs/index.md | 22 +++++++++++----------- 2 files changed, 33 insertions(+), 11 deletions(-) diff --git a/CHANGELOG.md b/CHANGELOG.md index 0306902a..8379741a 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -1,3 +1,25 @@ +## 1.2.0 (Aug 1, 2023) +-FEATURES: +* Enable creating cluster admin in cluster create +* Add support for cluster properties update and delete + +-ENHANCEMENTS: +* Update the documentation files +* identity_provider resource can be imported by terraform import command +* rosa_cluster resource can be imported by terraform import command +* Remove AWS validations from rosa_cluster resource +* Recreate IDP tf resource if it was deleted not from tf +* Recreate rosa_cluster tf resource if it was deleted not from tf +* Recreate MachinePool tf resource if it was deleted not from tf +* Bug fixes: + * populate rosa_rf_version with cluster properties + * Cluster properties are now allowed to be added in Day1 and be changed in Day 2 + * TF-provider support creating a single-az machinepool for multi-az cluster + * Improve error message: replica or autoscaling should be required parameters for creating additional machinepools + * Validate OCP version in create_account_roles module + * Support in generated account_role_prefix by terraform provider + + ## 1.1.0 (Jul 5, 2023) -ENHANCEMENTS: * Update the documentation files diff --git a/docs/index.md b/docs/index.md index 0aefb1fb..41ca7ded 100644 --- a/docs/index.md +++ b/docs/index.md @@ -6,7 +6,7 @@ description: |- --- - RedHat logo + RedHat logo # Red Hat Cloud Services Provider @@ -98,7 +98,7 @@ To use the Red Hat Cloud Services provider inside your Terraform configuration y You need to have created the AWS account-wide roles. The specific account-wide IAM roles and policies provide the STS permissions required for ROSA support, installation, control plane, and compute functionality. This includes account-wide Operator policies. - To create the account roles using Terraform, see the [Account Roles Terraform example](https://github.com/terraform-redhat/terraform-provider-rhcs/tree/v1.2.0-prerelease.1/examples/create_account_roles/). + To create the account roles using Terraform, see the [Account Roles Terraform example](https://github.com/terraform-redhat/terraform-provider-rhcs/tree/v1.2.0/examples/create_account_roles/). * AWS Permissions @@ -186,20 +186,20 @@ To use the Red Hat Cloud Services provider inside your Terraform configuration y The example Terraform files are all considered in development and should not be used for production environments: ### Before creating a cluster -* **Required**: [Account Roles Terraform](https://github.com/terraform-redhat/terraform-provider-rhcs/tree/v1.2.0-prerelease.1/examples/create_account_roles/) +* **Required**: [Account Roles Terraform](https://github.com/terraform-redhat/terraform-provider-rhcs/tree/v1.2.0/examples/create_account_roles/) ### Creating a ROSA cluster -* [Create a ROSA cluster that uses STS and has a managed OIDC configuration](https://github.com/terraform-redhat/terraform-provider-rhcs/tree/v1.2.0-prerelease.1/examples/create_rosa_sts_cluster/oidc_configuration/cluster_with_managed_oidc_config/) -* [Create a ROSA cluster that uses STS and has an unmanaged OIDC configuration](https://github.com/terraform-redhat/terraform-provider-rhcs/tree/v1.2.0-prerelease.1/examples/create_rosa_sts_cluster/oidc_configuration/cluster_with_unmanaged_oidc_config/) +* [Create a ROSA cluster that uses STS and has a managed OIDC configuration](https://github.com/terraform-redhat/terraform-provider-rhcs/tree/v1.2.0/examples/create_rosa_sts_cluster/oidc_configuration/cluster_with_managed_oidc_config/) +* [Create a ROSA cluster that uses STS and has an unmanaged OIDC configuration](https://github.com/terraform-redhat/terraform-provider-rhcs/tree/v1.2.0/examples/create_rosa_sts_cluster/oidc_configuration/cluster_with_unmanaged_oidc_config/) ### After creating a cluster -* [Machine pools](https://github.com/terraform-redhat/terraform-provider-rhcs/tree/v1.2.0-prerelease.1/examples/create_machine_pool/) +* [Machine pools](https://github.com/terraform-redhat/terraform-provider-rhcs/tree/v1.2.0/examples/create_machine_pool/) * Supported identity providers: - * [Github](https://github.com/terraform-redhat/terraform-provider-rhcs/tree/v1.2.0-prerelease.1/examples/create_identity_provider/github/) - * [Gitlab](https://github.com/terraform-redhat/terraform-provider-rhcs/tree/v1.2.0-prerelease.1/examples/create_identity_provider/gitlab/) - * [Google](https://github.com/terraform-redhat/terraform-provider-rhcs/tree/v1.2.0-prerelease.1/examples/create_identity_provider/google/) - * [HTPasswd](https://github.com/terraform-redhat/terraform-provider-rhcs/tree/v1.2.0-prerelease.1/examples/create_identity_provider/google/) - * [LDAP](https://github.com/terraform-redhat/terraform-provider-rhcs/tree/v1.2.0-prerelease.1/examples/create_identity_provider/ldap/) + * [Github](https://github.com/terraform-redhat/terraform-provider-rhcs/tree/v1.2.0/examples/create_identity_provider/github/) + * [Gitlab](https://github.com/terraform-redhat/terraform-provider-rhcs/tree/v1.2.0/examples/create_identity_provider/gitlab/) + * [Google](https://github.com/terraform-redhat/terraform-provider-rhcs/tree/v1.2.0/examples/create_identity_provider/google/) + * [HTPasswd](https://github.com/terraform-redhat/terraform-provider-rhcs/tree/v1.2.0/examples/create_identity_provider/google/) + * [LDAP](https://github.com/terraform-redhat/terraform-provider-rhcs/tree/v1.2.0/examples/create_identity_provider/ldap/) * [Upgrading or updating your cluster](upgrading-cluster.md) ### Create your Operator IAM roles prefix name