Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion docs/guides/getting-started.html.md
Original file line number Diff line number Diff line change
Expand Up @@ -113,7 +113,7 @@ provider "kubernetes" {
host = data.aws_eks_cluster.example.endpoint
cluster_ca_certificate = base64decode(data.aws_eks_cluster.example.certificate_authority[0].data)
exec {
api_version = "client.authentication.k8s.io/v1beta1"
api_version = "client.authentication.k8s.io/v1"
args = ["eks", "get-token", "--cluster-name", var.cluster_name]
command = "aws"
}
Expand Down
6 changes: 3 additions & 3 deletions docs/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,7 @@ resource "kubernetes_namespace" "example" {

## Terraform version

This provider requires Terraform version `v1.0.0` or above.
This provider requires Terraform version `v1.0.0` or above.

## Kubernetes versions

Expand Down Expand Up @@ -116,7 +116,7 @@ provider "kubernetes" {
host = var.cluster_endpoint
cluster_ca_certificate = base64decode(var.cluster_ca_cert)
exec {
api_version = "client.authentication.k8s.io/v1beta1"
api_version = "client.authentication.k8s.io/v1"
args = ["eks", "get-token", "--cluster-name", var.cluster_name]
command = "aws"
}
Expand Down Expand Up @@ -195,7 +195,7 @@ The following arguments are supported:
* `token` - (Optional) Token of your service account. Can be sourced from `KUBE_TOKEN`.
* `proxy_url` - (Optional) URL to the proxy to be used for all API requests. URLs with "http", "https", and "socks5" schemes are supported. Can be sourced from `KUBE_PROXY_URL`.
* `exec` - (Optional) Configuration block to use an [exec-based credential plugin] (https://kubernetes.io/docs/reference/access-authn-authz/authentication/#client-go-credential-plugins), e.g. call an external command to receive user credentials.
* `api_version` - (Required) API version to use when decoding the ExecCredentials resource, e.g. `client.authentication.k8s.io/v1beta1`.
* `api_version` - (Required) API version to use when decoding the ExecCredentials resource, e.g. `client.authentication.k8s.io/v1`.
* `command` - (Required) Command to execute.
* `args` - (Optional) List of arguments to pass when executing the plugin.
* `env` - (Optional) Map of environment variables to set when executing the plugin.
Expand Down
2 changes: 1 addition & 1 deletion docs/resources/service.md
Original file line number Diff line number Diff line change
Expand Up @@ -199,7 +199,7 @@ provider "kubernetes" {
host = data.aws_eks_cluster.example.endpoint
cluster_ca_certificate = base64decode(data.aws_eks_cluster.example.certificate_authority[0].data)
exec {
api_version = "client.authentication.k8s.io/v1beta1"
api_version = "client.authentication.k8s.io/v1"
args = ["eks", "get-token", "--cluster-name", var.cluster_name]
command = "aws"
}
Expand Down
2 changes: 1 addition & 1 deletion docs/resources/service_v1.md
Original file line number Diff line number Diff line change
Expand Up @@ -199,7 +199,7 @@ provider "kubernetes" {
host = data.aws_eks_cluster.example.endpoint
cluster_ca_certificate = base64decode(data.aws_eks_cluster.example.certificate_authority[0].data)
exec {
api_version = "client.authentication.k8s.io/v1beta1"
api_version = "client.authentication.k8s.io/v1"
args = ["eks", "get-token", "--cluster-name", var.cluster_name]
command = "aws"
}
Expand Down
2 changes: 1 addition & 1 deletion examples/example_5.tf
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@ provider "kubernetes" {
host = var.cluster_endpoint
cluster_ca_certificate = base64decode(var.cluster_ca_cert)
exec {
api_version = "client.authentication.k8s.io/v1beta1"
api_version = "client.authentication.k8s.io/v1"
args = ["eks", "get-token", "--cluster-name", var.cluster_name]
command = "aws"
}
Expand Down
2 changes: 1 addition & 1 deletion examples/resources/service/example_2.tf
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ provider "kubernetes" {
host = data.aws_eks_cluster.example.endpoint
cluster_ca_certificate = base64decode(data.aws_eks_cluster.example.certificate_authority[0].data)
exec {
api_version = "client.authentication.k8s.io/v1beta1"
api_version = "client.authentication.k8s.io/v1"
args = ["eks", "get-token", "--cluster-name", var.cluster_name]
command = "aws"
}
Expand Down
2 changes: 1 addition & 1 deletion examples/resources/service_v1/example_2.tf
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ provider "kubernetes" {
host = data.aws_eks_cluster.example.endpoint
cluster_ca_certificate = base64decode(data.aws_eks_cluster.example.certificate_authority[0].data)
exec {
api_version = "client.authentication.k8s.io/v1beta1"
api_version = "client.authentication.k8s.io/v1"
args = ["eks", "get-token", "--cluster-name", var.cluster_name]
command = "aws"
}
Expand Down
2 changes: 1 addition & 1 deletion kubernetes/test-infra/eks/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -112,7 +112,7 @@ locals {
name = "terraform"
user = {
exec = {
apiVersion = "client.authentication.k8s.io/v1beta1"
apiVersion = "client.authentication.k8s.io/v1"
command = "aws"
args = [
"eks", "get-token", "--cluster-name", local.cluster_name
Expand Down
2 changes: 1 addition & 1 deletion kubernetes/test-infra/gke/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -92,7 +92,7 @@ locals {
name = google_service_account.default.email
user = {
exec = {
apiVersion = "client.authentication.k8s.io/v1beta1"
apiVersion = "client.authentication.k8s.io/v1"
command = "gke-gcloud-auth-plugin"
interactiveMode = "Never"
provideClusterInfo = true
Expand Down
2 changes: 1 addition & 1 deletion templates/guides/getting-started.html.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -113,7 +113,7 @@ provider "kubernetes" {
host = data.aws_eks_cluster.example.endpoint
cluster_ca_certificate = base64decode(data.aws_eks_cluster.example.certificate_authority[0].data)
exec {
api_version = "client.authentication.k8s.io/v1beta1"
api_version = "client.authentication.k8s.io/v1"
args = ["eks", "get-token", "--cluster-name", var.cluster_name]
command = "aws"
}
Expand Down
2 changes: 1 addition & 1 deletion templates/index.md.tmpl
Original file line number Diff line number Diff line change
Expand Up @@ -137,7 +137,7 @@ The following arguments are supported:
* `token` - (Optional) Token of your service account. Can be sourced from `KUBE_TOKEN`.
* `proxy_url` - (Optional) URL to the proxy to be used for all API requests. URLs with "http", "https", and "socks5" schemes are supported. Can be sourced from `KUBE_PROXY_URL`.
* `exec` - (Optional) Configuration block to use an [exec-based credential plugin] (https://kubernetes.io/docs/reference/access-authn-authz/authentication/#client-go-credential-plugins), e.g. call an external command to receive user credentials.
* `api_version` - (Required) API version to use when decoding the ExecCredentials resource, e.g. `client.authentication.k8s.io/v1beta1`.
* `api_version` - (Required) API version to use when decoding the ExecCredentials resource, e.g. `client.authentication.k8s.io/v1`.
* `command` - (Required) Command to execute.
* `args` - (Optional) List of arguments to pass when executing the plugin.
* `env` - (Optional) Map of environment variables to set when executing the plugin.
Expand Down
Loading