Commit Graph

10337 Commits

Author SHA1 Message Date
Clint 99e0aec769 provider/aws: Fix issue changing EIP Association (#6521)
provider/aws: Update EIP to use new associate_with_private_ip instead of private_ip
2016-05-06 15:38:39 -05:00
Radek Simko f0cf6564ad Update CHANGELOG.md 2016-05-06 18:01:48 +01:00
John Engelman 14f6f90621 Support standard AWS config in the S3 remote backend. (#5270) 2016-05-06 17:52:18 +01:00
KOJIMA Kazunori 2476dcbcae provider/aws: Fix typo in error message (#6518) 2016-05-06 09:57:04 -05:00
James Nugent f1031707f9 Update CHANGELOG.md 2016-05-05 21:51:45 -07:00
James Nugent 3785ea3c43 Merge pull request #6509 from meteor/glasser/datadog-schema
provider/datadog: fix code to match schema
2016-05-05 21:50:32 -07:00
David Glasser bef1b58fda provider/datadog: fix code to match schema
On Create, notify_no_data was being ignored.

On Read and Update, no_data_timeframe was being misused.

There was also a redundant read of escalation_message on Create.
2016-05-05 16:51:17 -07:00
Paul Stack df4ccdf5fa Update CHANGELOG.md 2016-05-05 22:59:39 +01:00
Justin Clark 380ada1019 provider/aws: Add agent_version argument to AWS_OPSWORKS_STACK 2016-05-05 22:56:44 +01:00
clint shryock 8129c0589c provider/aws: Require cookies for Cloudfront Distributions 2016-05-05 15:44:35 -05:00
Radek Simko 0648941063 Update CHANGELOG.md 2016-05-05 21:15:59 +01:00
Greg Thole ebfc701265 provider/aws: AWS API Gateway request parameters json (#6501)
* Update docs with new parameters

* Add request parameters as JSON

* Update function name and error statements
2016-05-05 21:14:51 +01:00
Radek Simko 03bc54b438 Merge pull request #6500 from hashicorp/radeksimko-patch-1
aws: Update docs after #6385 (account ID via sts)
2016-05-05 18:01:33 +01:00
Radek Simko d23fac3a28 aws: Update docs after #6385 (account ID via sts) 2016-05-05 17:51:44 +01:00
Radek Simko 069636ae9f Update CHANGELOG.md 2016-05-05 17:37:25 +01:00
Radek Simko e32a8c1c5b Merge pull request #6385 from Ticketmaster/use-sts-GetCallerIdentity
provider/aws: Added sts:GetCallerIdentity to GetAccountId for federated logins
2016-05-05 17:35:32 +01:00
Clint 351701ec39 Update CHANGELOG.md 2016-05-05 10:49:32 -05:00
Clint c58892485b provider/aws: Allow empty S3 config in Cloudfront Origin (#6487)
* provider/aws: Allow empty S3 config in Cloudfront Origin
2016-05-05 10:49:09 -05:00
Clint be74cb2892 Update CHANGELOG.md 2016-05-05 10:18:28 -05:00
Clint 068f6f606d provider/aws: Fix issue in upgrading AutoScaling Policy (#6440)
* provider/aws: Fix issue in upgrading AutoScaling Policy min_adjustment_steps

- Update depreciation message on min_adjustment_step
2016-05-05 10:17:54 -05:00
thetuxkeeper 83f87e3741 fixed ipv6 - changed to Computed like ipv4 (#6480) 2016-05-05 15:38:45 +01:00
Kraig Amador a23bcf2ec9 Added accountid to AWSClient and set it early in the initialization phase. We use iam.GetUser(nil) scattered around to get the account id, but this isn't the most reliable method. GetAccountId now uses one more method (sts:GetCallerIdentity) to get the account id, this works with federated users. 2016-05-05 07:02:12 -07:00
Kraig Amador e04e87361f vendor: Updated github.com/aws/aws-sdk-go to v1.1.23 The new STS library includes GetCallerIdentity which can be used to build ARNs for RDS resources when using IAM roles 2016-05-05 07:02:10 -07:00
Paul Hinze b4df304b47
helper/schema: Normalize bools to "true"/"false" in diffs
For a long time now, the diff logic has relied on the behavior of
`mapstructure.WeakDecode` to determine how various primitives are
converted into strings.  The `schema.DiffString` function is used for
all primitive field types: TypeBool, TypeInt, TypeFloat, and TypeString.

The `mapstructure` library's string representation of booleans is "0"
and "1", which differs from `strconv.FormatBool`'s "false" and "true"
(which is used in writing out boolean fields to the state).

Because of this difference, diffs have long had the potential for
cosmetically odd but semantically neutral output like:

    "true" => "1"
    "false" => "0"

So long as `mapstructure.Decode` or `strconv.ParseBool` are used to
interpret these strings, there's no functional problem.

We had our first clear functional problem with #6005 and friends, where
users noticed diffs like the above showing up unexpectedly and causing
troubles when `ignore_changes` was in play.

This particular bug occurs down in Terraform core's EvalIgnoreChanges.
There, the diff is modified to account for ignored attributes, and
special logic attempts to handle properly the situation where the
ignored attribute was going to trigger a resource replacement. That
logic relies on the string representations of the Old and New fields in
the diff to be the same so that it filters properly.

So therefore, we now get a bug when a diff includes `Old: "0", New:
"false"` since the strings do not match, and `ignore_changes` is not
properly handled.

Here, we introduce `TypeBool`-specific normalizing into `finalizeDiff`.
I spiked out a full `diffBool` function, but figuring out which pieces
of `diffString` to duplicate there got hairy. This seemed like a simpler
and more direct solution.

Fixes #6005 (and potentially others!)
2016-05-05 09:00:58 -05:00
Blake Smith 8821aea945 provider/aws: Add AWS EMR dependency (#2098) (#6492) 2016-05-05 11:34:18 +01:00
Radek Simko 4f2eec0c3a Update CHANGELOG.md 2016-05-05 11:15:28 +01:00
Kraig Amador 1f80ec48d0 Added RDS event subscriptions (#6367) 2016-05-05 11:14:25 +01:00
James Nugent c8928e4f5d Update CHANGELOG.md 2016-05-04 14:11:33 -05:00
James Nugent a7817c0710 Merge pull request #6469 from hashicorp/jt-ie-bnr
website: add a height to svg in bnr to fix IE bug
2016-05-04 14:10:01 -05:00
James Nugent a7a6aba0d2 Merge pull request #6484 from stumbaumr/patch-1
provider/vsphere: Fix typos in README.
2016-05-04 14:09:10 -05:00
stumbaumr 207fa068c6 Fixed obvious typos 2016-05-04 21:07:48 +02:00
Clint 2f8658619f Update CHANGELOG.md 2016-05-04 14:07:17 -05:00
Justin Nauman 1c691dcc68 provider/aws: Updating CloudFront distribution to set LoggingConfig if disabled (#6407)
- Addresses the issue when local state file has logging_config populated and the user
  disables the configuration via the UI (or in this case an
  application of the TF config).  This will now properly set the
  logging_config during the read operation and identify the state as
  diverging

Fixes #6390
2016-05-04 14:06:45 -05:00
James Nugent 63849a5d7d Merge pull request #6482 from godmodelabs/fix-memory-reservation-templated
provider/vsphere: missing memory reservation in deployVirtualMachine
2016-05-04 14:05:46 -05:00
Daniel 5182bf6338 missing memory reservation in deployVirtualMachine 2016-05-04 18:53:44 +02:00
Paul Hinze 8cf13d9582 Merge pull request #6475 from hashicorp/b-oh-godeps
godeps: fixup missing deps
2016-05-04 11:06:21 -05:00
Paul Hinze 12eb536b25
godeps: fixup missing deps
This diff was generated by:

 * `godep restore -v`, correcting any hiccups until it succeeded
 * `rm -rf vendor/ Godep`
 * `godep save -v ./...`
2016-05-04 10:54:22 -05:00
Radek Simko 507ae65f43 Update CHANGELOG.md 2016-05-04 11:59:30 +01:00
Josh Taylor 983da213af provider/aws: add response parameters support to api gateway (#6344)
* provider/aws: Add support for response parameters aws_api_gateway_integration_response and aws_api_gateway_method response.

* fix spacing

* fix spacing

* gofmt

* add update test; add docs; add reimplement TODO; add field read

* resolve conflict

* fix expandAPIGatewayMethodResponse error handling
2016-05-04 11:56:18 +01:00
captainill 5ed03602d7 add a height to svg in bnr to fix IE bug 2016-05-03 18:37:47 -07:00
Paul Hinze 952152280e Merge pull request #6453 from hashicorp/phinze/go-rootcerts
atlas: Use go-rootcerts for certificate loading
2016-05-03 18:00:57 -05:00
Clint 71cd09d0ab Update CHANGELOG.md 2016-05-03 17:21:49 -05:00
Justin Nauman 7f738bebd3 provider/aws: Support eventually consistent aws_security_group_rule (#6325)
* TF-6256 - SG Rule Retry

- Preferring slower but consistent runs when AWS API calls do not properly return the SG Rule in the list of ingress/egress rules.
- Testing has shown that several times that we had to exceed 20 attempts
before the SG was actually returned

* TF-6256 - Refactor of rule lookup

- Adjusting to use resource.Retry
- Extract lookup method for matching ipPermissions set
2016-05-03 17:21:04 -05:00
James Nugent 8dc9b4baa4 Update CHANGELOG.md 2016-05-03 16:19:54 -05:00
Sargurunathan Mohan a5825f907b Fix launch_configuration error when using ebs which is encrypted 2016-05-03 16:19:54 -05:00
Clint 175f7bb436 provider/aws: Bump Cloudfront dependency to 1.1.15, matching the rest of AWS (#6465) 2016-05-03 16:16:40 -05:00
James Nugent cce42eebf0 Update CHANGELOG.md 2016-05-03 16:13:14 -05:00
James Nugent 309491aa7f Merge branch 'TheWeatherCompany-feature/softlayer-virtual-guest' 2016-05-03 16:05:28 -05:00
danielcbright 8921e10d71 Added softlayer virtual guest and ssh keys functionality:
Here is an example that will setup the following:
+ An SSH key resource.
+ A virtual server resource that uses an existing SSH key.
+ A virtual server resource using an existing SSH key and a Terraform managed SSH key (created as "test_key_1" in the example below).

(create this as sl.tf and run terraform commands from this directory):
```hcl
provider "softlayer" {
    username = ""
    api_key = ""
}

resource "softlayer_ssh_key" "test_key_1" {
    name = "test_key_1"
    public_key = "${file(\"~/.ssh/id_rsa_test_key_1.pub\")}"
    # Windows Example:
    # public_key = "${file(\"C:\ssh\keys\path\id_rsa_test_key_1.pub\")}"
}

resource "softlayer_virtual_guest" "my_server_1" {
    name = "my_server_1"
    domain = "example.com"
    ssh_keys = ["123456"]
    image = "DEBIAN_7_64"
    region = "ams01"
    public_network_speed = 10
    cpu = 1
    ram = 1024
}

resource "softlayer_virtual_guest" "my_server_2" {
    name = "my_server_2"
    domain = "example.com"
    ssh_keys = ["123456", "${softlayer_ssh_key.test_key_1.id}"]
    image = "CENTOS_6_64"
    region = "ams01"
    public_network_speed = 10
    cpu = 1
    ram = 1024
}
```

You'll need to provide your SoftLayer username and API key,
so that Terraform can connect. If you don't want to put
credentials in your configuration file, you can leave them
out:

```
provider "softlayer" {}
```

...and instead set these environment variables:

- **SOFTLAYER_USERNAME**: Your SoftLayer username
- **SOFTLAYER_API_KEY**: Your API key
2016-05-03 15:58:58 -05:00
Mitchell Hashimoto 398fad4277 Update CHANGELOG.md 2016-05-03 13:28:33 -07:00