Commit Graph

17873 Commits

Author SHA1 Message Date
pradeepbhadani 40d430ed66 Fix typo 2017-04-03 17:52:50 +01:00
pradeepbhadani bf8497ed40 Fix typo 2017-04-03 17:52:35 +01:00
pradeepbhadani efab9e325e Fix typo 2017-04-03 17:51:20 +01:00
James Bardin 3d604851c2 test -lock-timeout from cli 2017-04-03 11:50:19 -04:00
James Bardin d1460d8c82 test LockWithContext 2017-04-03 11:50:19 -04:00
Tom Harvey 5c2bf35157 Merge pull request #13288 from ahoka/patch-1
Update Azure DNS CNAME documentation to reflect reality
2017-04-03 16:19:49 +01:00
= e2d7d5fc68 Removed random provider frm iam policy attachment test 2017-04-03 08:11:54 -06:00
Adam Hoka fbbfe67bb5 Update documentation to reflect reality
From the code:

			"records": &schema.Schema{
				Type:     schema.TypeString,
				Optional: true,
				Elem:     &schema.Schema{Type: schema.TypeString},
				Set:      schema.HashString,
				Removed:  "Use `record` instead. This attribute will be removed in a future version",
			},

			"record": &schema.Schema{
				Type:     schema.TypeString,
				Required: true,
2017-04-03 14:11:25 +02:00
Tom Harvey b4b9f1e74c Merge pull request #13284 from lagartoflojo/patch-1
Fix small typo in interpolation doc
2017-04-03 10:37:24 +01:00
Paul Stack ef2d2646a8 Update CHANGELOG.md 2017-04-03 12:13:58 +03:00
Paul Stack b80d3e5701 provider/aws: Set stickiness to computed in alb_target_group (#13278)
The Default values set by AWS were breaking the AWS ALB Listener Rule
tests. The stickiness parameter needed to be set to be Computed: true to
remove this discrepancy

```
% make testacc TEST=./builtin/providers/aws TESTARGS='-run=TestAccAWSALBListenerRule_basic'
==> Checking that code complies with gofmt requirements...
go generate $(go list ./... | grep -v /terraform/vendor/)
2017/04/03 01:23:47 Generated command/internal_plugin_list.go
TF_ACC=1 go test ./builtin/providers/aws -v -run=TestAccAWSALBListenerRule_basic -timeout 120m
=== RUN   TestAccAWSALBListenerRule_basic
--- PASS: TestAccAWSALBListenerRule_basic (235.36s)
PASS
ok  	github.com/hashicorp/terraform/builtin/providers/aws	235.397s
```
2017-04-03 12:11:45 +03:00
Hernán Schmidt 2d8f3f257a Fix small typo 2017-04-03 10:38:35 +02:00
Ameir Abdeldayem 2e5abb1e84 If `aws_s3_bucket` logging options are cleared on the AWS side, Terraform does not detect this, and changes must be made out-of-band or through a recreation of the resource. This PR addresses this issue.
Fixes #8576.
2017-04-03 03:00:51 -04:00
stack72 d209dc1a32
provider/aws: Fixup AWS db instance acceptance tests with default security group 2017-04-03 01:48:45 +03:00
James Bardin 93b1dd6323 give LockWithContext a little backoff
Backoff the Lock calls exponentially, to a reasonable limit.
2017-04-01 18:01:49 -04:00
James Bardin 5eca913b14 add cli flags for -lock-timeout
Add the -lock-timeout flag to the appropriate commands.
Add the -lock flag to `init` and `import` which were missing it.
Set both stateLock and stateLockTimeout in Meta.flagsSet, and remove the
extra references for clarity.
2017-04-01 17:09:21 -04:00
James Bardin 9e9d0b1bdf move force-unlock to plumbing
shouldn't be listed as a common command
2017-04-01 17:09:20 -04:00
James Bardin 305ef43aa6 provide contexts to clistate.Lock calls
Add fields required to create an appropriate context for all calls to
clistate.Lock.

Add missing checks for Meta.stateLock, where we would attempt to lock,
even if locking should be skipped.
2017-04-01 17:09:20 -04:00
James Bardin 3f0dcd1308 Have the clistate Lock use LockWithContext
- Have the ui Lock helper use state.LockWithContext.
- Rename the message package to clistate, since that's how it's imported
  everywhere.
- Use a more idiomatic placement of the Context in the LockWithContext
  args.
2017-04-01 17:09:20 -04:00
James Bardin 826771a830 add state.LockWithContext
LockWithContext will retry a lock until the context expires or is
cancelled. This will let us implement a `-lock-timeout` flag, and make
use of existing contexts when applicable.
2017-04-01 17:01:55 -04:00
James Bardin 75458a182d remove extra state.Locker assertions
All states are lockers, so get rid of extra asertions.
2017-04-01 17:01:45 -04:00
James Bardin bf6384a163 All states are lockers
Since moving to the new backends, all states (except InmemState) are
Lockers. Add the methods to the State interface to remove a heap of
assertion checks.
2017-04-01 17:01:12 -04:00
Radek Simko 9b55ce5385 Update CHANGELOG.md 2017-04-01 17:32:18 +01:00
Masayuki Morita 4b9ec9c920 provider/aws: Validate aws_ecs_task_definition.container_definitions (#12161) 2017-04-01 17:31:32 +01:00
Radek Simko 26c5445477 Update CHANGELOG.md 2017-04-01 15:42:17 +01:00
Jonathan Camp b8f6e2a70a provider/aws: handle aws_lambda_function missing s3 key error (#10960)
* ensure NoSuchKey is not a retryable error

* Simplify err handling + lower log msg severity
2017-04-01 15:39:46 +01:00
Radek Simko 6667a85cd9 Update CHANGELOG.md 2017-04-01 06:58:27 +01:00
Doug Neal 0c4c578552 provider/aws: Implement aws_ses_domain_identity (#13098)
* provider/aws: New resource: aws_ses_domain_identity

Provide a resource to manage domain identities in SES. Exports the
verification_code attribute which can be used to add the TXT record to
the domain to complete the domain verification.

* provider/aws: Acceptance tests for aws_ses_domain_identity

* Resource aws_ses_domain_identity: Documentation update

Provide documentation for the new resource type.
2017-04-01 06:57:34 +01:00
Radek Simko 173bf10e7b Update CHANGELOG.md 2017-03-31 22:22:12 +01:00
Jie Wang 48f749cb28 provider/azurerm: Fix crash when importing Local Network Gateway (#9198) 2017-03-31 13:58:45 -07:00
Jie Wang 469b9a2d23 Revert "Fix crash in import azurerm_local_network_gateway"
This reverts commit 630f371b0c.
2017-03-31 13:56:15 -07:00
Jie Wang 8308ed2246 Revert "Better error message for LNG import error."
This reverts commit 1db5efc8bc.
2017-03-31 13:55:52 -07:00
Jie Wang 65c4b9ca38 Revert "Even better error message."
This reverts commit ebd5dc5d3d.
2017-03-31 13:55:39 -07:00
Seth Vargo e1be539868 Merge pull request #13182 from hashicorp/sethvargo/create_or_update
Handle the case when issue labels already exist
2017-03-31 16:38:51 -04:00
James Bardin 8050eda52d don't delete local state on a local backend
Don't erase local state during backend migration if the new and old
paths are the same. Skipping the confirmation and copy are handled in
another patch, but the local state was always erased by default, even
when it was our new state.
2017-03-31 15:26:23 -04:00
tombuildsstuff 2a3f16267a Sorting the errors 2017-03-31 20:24:40 +01:00
tombuildsstuff 6a6536f901 Updating 'duplicate_detection_history_time_window' to default to 10m as per the docs 2017-03-31 20:24:22 +01:00
James Nugent 50fb9aecbd deps: Update github.com/joyent/triton-go/authentication (#13255)
This commit allows private key material to be used with the Triton
provider, which is necessary for running acceptance tests in the
HashiCorp CI environment.
2017-03-31 21:33:08 +03:00
Colin Wood 1ce0776c51 Add documentation about aws_subnet_ids 2017-03-31 11:21:44 -07:00
Jay Wang ebd5dc5d3d Even better error message. 2017-03-31 11:07:30 -07:00
Jay Wang 1db5efc8bc Better error message for LNG import error. 2017-03-31 11:07:30 -07:00
Jay Wang 630f371b0c Fix crash in import azurerm_local_network_gateway
The plug-in crashes if "localNetworkGateways" is not found in the id parameter. The fix is to verify the parameter before proceeding.

Also the "import" example in the documentation is wrong, "localNetworkGateways" should be case sensitive. The current example actually causes the plugin to crash due to the bug.
2017-03-31 11:07:30 -07:00
Colin Wood d7a319f239 Fix accpetence test to work 2017-03-31 10:57:07 -07:00
Paul Stack d7a339eb46 Update CHANGELOG.md 2017-03-31 20:23:27 +03:00
Joshua Spence d25c310468 Add `name_prefix` to RDS resources (#13232)
Adds `name_prefix` (or, in some cases, `identifier_prefix`) support to all AWS RDS resources.
2017-03-31 20:22:57 +03:00
Colin Wood a424fffd48 Add support for aws_subnet_ids as a data source 2017-03-31 10:22:39 -07:00
Paul Stack e7c3e8df68 provider/aws: change kinesis_firehose_delivery_stream to point to correct destination (#13251)
Fixes: #13244
2017-03-31 20:00:47 +03:00
Paul Stack 2f0cbda435 Update CHANGELOG.md 2017-03-31 19:59:59 +03:00
Paul Stack 4501be7e5c backend/remote-state: Add support for assume role extensions to s3 backend (#13236)
Fixes: #13234

This now matches the AWS provider for the Assume Role support
2017-03-31 19:59:29 +03:00
Paul Stack 4450f99191 Update CHANGELOG.md 2017-03-31 19:45:32 +03:00