Mitchell Hashimoto
a594ef9a28
providers/aws: expandIPPerms works again
2014-08-20 11:18:16 -07:00
Jason Padvorac
8d97c3656c
Add listener.ssl_certificate_id support to AWS ELB
2014-08-10 17:16:53 -07:00
Alek Storm
7109b8c770
Implement specification of AWS security groups in ingress rules as <owner>/<id>
2014-08-08 11:51:18 -07:00
Jack Pearkes
7adc6162d8
providers/aws: add test for health check, save health check state
...
cc/ @vertis
I added an acceptance test here, as well as making it so we
saved the health check state on update_state.
2014-07-30 10:15:22 -04:00
Jack Pearkes
4f2026f6c6
providers/aws: only flatten cidr if they exist
...
fixes #87
2014-07-29 10:29:48 -04:00
Jack Pearkes
da4ddef136
providers/aws: fix assertion of non-required cidr blocks in sec groups
...
fixes #65 , #86
2014-07-29 10:05:32 -04:00
Jack Pearkes
298483131b
providers/aws: fixed tons of aws stuff
2014-07-24 18:50:33 -04:00
Mitchell Hashimoto
79dbd07679
providers/aws: no empty security groups when flattening ip perms
...
/cc @pearkes - A few things here:
First, this fixes the issue you mentioned to be in chat. Basically: if
there are no security groups, don't put it into flatten, because flatten
will include a "key.#" = "0".
Next, I transformed your test into a "table-driven" test which are really
nice to write and maintain. Basically, as you find bugs or edge cases, you can
just add to the table and you get the test for free. I recommend these
whereever you have a pure input to output sort of data transformation
function.
2014-07-16 18:32:36 -07:00
Jack Pearkes
bcc6f884b1
providers/aws: actually return ingress rule on refresh, tests
2014-07-16 20:14:01 -04:00
Jack Pearkes
901785d04a
providers/aws: expand wildcard string lists
2014-07-16 18:51:50 -04:00
Jack Pearkes
47468c32a4
providers/aws: egress and ingress for sg
2014-07-08 16:34:10 -04:00
Jack Pearkes
0f64ff9387
providers/aws: availability_zones and expandList
2014-07-07 10:07:06 -04:00
Jack Pearkes
1b6faa0eb9
providers/aws: helper for expanding listeners
2014-07-07 10:07:06 -04:00