Skip to content

Commit 8aeeabb

Browse files
authored
v2.16.1 (#1927)
1 parent 50b1f3e commit 8aeeabb

File tree

2 files changed

+54
-0
lines changed

2 files changed

+54
-0
lines changed

CHANGELOG.md

Lines changed: 53 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,56 @@
1+
## 2.16.1 (December 5, 2022)
2+
3+
ENHANCEMENTS:
4+
5+
* Add additional validation on the delete operation to make it idempotent. [[GH-1914](https://github.com/hashicorp/terraform-provider-kubernetes/issues/1914)], [[GH-1919](https://github.com/hashicorp/terraform-provider-kubernetes/issues/1919)], [[GH-1898](https://github.com/hashicorp/terraform-provider-kubernetes/issues/1898)]
6+
7+
This affects the following resources:
8+
- `kubernetes_api_service`
9+
- `kubernetes_api_service_v1`
10+
- `kubernetes_cluster_role`
11+
- `kubernetes_cluster_role_v1`
12+
- `kubernetes_cluster_role_binding`
13+
- `kubernetes_cluster_role_binding_v1`
14+
- `kubernetes_config_map`
15+
- `kubernetes_config_map_v1`
16+
- `kubernetes_daemonset`
17+
- `kubernetes_daemon_set_v1`
18+
- `kubernetes_deployment`
19+
- `kubernetes_deployment_v1`
20+
- `kubernetes_endpoints`
21+
- `kubernetes_endpoints_v1`
22+
- `kubernetes_horizontal_pod_autoscaler`
23+
- `kubernetes_horizontal_pod_autoscaler_v1`
24+
- `kubernetes_horizontal_pod_autoscaler_v2beta2`
25+
- `kubernetes_horizontal_pod_autoscaler_v2`
26+
- `kubernetes_mutating_webhook_configuration`
27+
- `kubernetes_mutating_webhook_configuration_v1`
28+
- `kubernetes_network_policy`
29+
- `kubernetes_network_policy_v1`
30+
- `kubernetes_persistent_volume_claim`
31+
- `kubernetes_persistent_volume_claim_v1`
32+
- `kubernetes_pod`
33+
- `kubernetes_pod_v1`
34+
- `kubernetes_pod_disruption_budget`
35+
- `kubernetes_pod_disruption_budget_v1`
36+
- `kubernetes_pod_security_policy`
37+
- `kubernetes_pod_security_policy_v1beta1`
38+
- `kubernetes_priority_class`
39+
- `kubernetes_replication_controller`
40+
- `kubernetes_resource_quota`
41+
- `kubernetes_role`
42+
- `kubernetes_role_binding`
43+
- `kubernetes_secret`
44+
- `kubernetes_namespace`
45+
- `kubernetes_service`
46+
- `kubernetes_service_account`
47+
- `kubernetes_stateful_set`
48+
- `kubernetes_storage_class`
49+
- `kubernetes_validating_webhook_configuration`
50+
- `kubernetes_validating_webhook_configuration_v1 `
51+
52+
Special thanks to @sheneska for making these changes as part of her internship @hashicorp! 🚀
53+
154
## 2.16.0 (November 18, 2022)
255

356
FEATURES:

website/docs/d/service_account.html.markdown

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -56,6 +56,7 @@ The following arguments are supported:
5656
* `default_secret_name` - (Deprecated) Name of the default secret, containing service account token, created & managed by the service. By default, the provider will try to find the secret containing the service account token that Kubernetes automatically created for the service account. Where there are multiple tokens and the provider cannot determine which was created by Kubernetes, this attribute will be empty. When only one token is associated with the service account, the provider will return this single token secret.
5757

5858
Starting from version `1.24.0` by default Kubernetes does not automatically generate tokens for service accounts. That leads to the situation when `default_secret_name` cannot be computed and thus will be an empty string. In order to create a service account token, please [use `kubernetes_secret_v1` resource](https://registry.terraform.io/providers/hashicorp/kubernetes/latest/docs/resources/secret_v1#example-usage-service-account-token)
59+
5960
### `image_pull_secret`
6061

6162
#### Attributes

0 commit comments

Comments
 (0)