Jason Gedge
3c6faf068f
Allow setting the notification topic ARN for ElastiCache clusters.
2015-09-22 15:49:59 -04:00
Paul Hinze
028e50bae6
Merge pull request #3250 from stack72/aws-elasticache-configuration_endpoint
...
Adding configuration endpoint to the elasticache cluster nodes
2015-09-17 14:27:10 -05:00
Radek Simko
f90d2442ca
Merge pull request #3196 from elblivion/allow-r53-zero-weighted-rr-creation
...
provider/aws: Allow weight = 0 in Route53 records
2015-09-17 18:14:30 +01:00
Anthony Stanton
44f2d85de8
Add acceptance test
...
=== RUN TestAccAWSRoute53Record_weighted
--- PASS: TestAccAWSRoute53Record_weighted (249.19s)
2015-09-17 17:20:12 +02:00
stack72
68c187c01e
Changing the ElastiCache Cluster configuration_engine to be on the cluster, not on the cache nodes
2015-09-16 17:15:31 +01:00
Paul Hinze
96317a6a38
Merge pull request #3152 from dwradcliffe/read_source_dest_check_state
...
provider/aws: read instance source_dest_check and save to state
2015-09-16 10:29:37 -05:00
stack72
029f1fa572
Adding configuration endpoint to the elasticache cluster nodes
2015-09-16 13:06:54 +01:00
Anthony Scalisi
198e1a5186
remove various typos
2015-09-11 11:56:20 -07:00
Anthony Stanton
a0d9a4c96f
Workaround to allow weight = 0 in Route53 RRs
...
Moved the GetOk to a Get in the set_identifier block so
we can create a zero-weighted RR - otherwise this falls foul
of a check in GetOk.
See https://github.com/hashicorp/terraform/issues/3189
2015-09-10 10:50:50 +02:00
Paul Hinze
8559b02099
Merge pull request #3001 from sarguru/iam_profile_validation
...
Fail silently when account validation fails while from instance profile
2015-09-08 13:29:09 -05:00
Paul Hinze
dcaf0f8b87
provider/aws: correct && -> || mistake
...
Thanks for the sanity check, @aparrentlymart and @dwradcliffe :)
2015-09-06 12:01:57 -05:00
Kazunori Kojima
47d2b29895
Use `%t` for boolean value
2015-09-06 11:06:29 +09:00
Kazunori Kojima
707fe3ac6d
Changed to versioning block
2015-09-05 17:19:52 +09:00
Kazunori Kojima
0fbfd71f96
Allows S3 bucket versioning configuration
2015-09-05 11:38:56 +09:00
Paul Hinze
1dfad739bb
provider/aws: tweak iam_instance_profile logic
...
- always `d.Set` to either the profile name or the empty string
- add some conservative pointer checking to the helper method
/cc @dwradcliffe
2015-09-04 19:20:58 -05:00
Paul Hinze
d937045afd
Merge pull request #3167 from dwradcliffe/read_instance_role
...
provider/aws: read iam_instance_profile for instance and save to state
2015-09-04 19:15:24 -05:00
Paul Hinze
5f3b6f9952
Merge pull request #3120 from apparentlymart/elasticache-subnet-names
...
aws_elasticache_subnet_group normalizes name to lowercase.
2015-09-04 13:21:06 -05:00
Paul Hinze
3abf4796d4
Merge pull request #2784 from apparentlymart/aws-images
...
AWS AMI resources
2015-09-04 13:16:44 -05:00
David Radcliffe
0b88177cf0
read iam_instance_profile and save to state
2015-09-03 15:43:41 -04:00
Paul Hinze
eb150ae025
provider/aws: add ses_smtp_password to iam_access_key
...
AWS gives instructions for converting AWS credentials into SES SMTP
credentials here:
https://docs.aws.amazon.com/ses/latest/DeveloperGuide/smtp-credentials.html#smtp-credentials-convert
This implements their algorithm and yields the result as an attribute on
`iam_access_key`.
2015-09-03 13:01:04 -05:00
Martin Atkins
7f64327663
Three resources for AWS AMIs.
...
AWS provides three different ways to create AMIs that each have different
inputs, but once they are complete the same management operations apply.
Thus these three resources each have a different "Create" implementation
but then share the same "Read", "Update" and "Delete" implementations.
2015-09-03 10:05:41 -07:00
Martin Atkins
4ae3a17eab
aws_elasticache_subnet_group normalizes name to lowercase.
...
The Elasticache API accepts a mixed-case subnet name on create, but
normalizes it to lowercase before storing it. When retrieving a subnet,
the name is treated as case-sensitive, so the lowercase version must be
used.
Given that case within subnet names is not significant, the new StateFunc
on the name attribute causes the state to reflect the lowercase version
that the API uses, and changes in case alone will not show as a diff.
Given that we must look up subnet names in lower case, we set the
instance id to be a lowercase version of the user's provided name. This
then allows a later Refresh call to succeed even if the user provided
a mixed-case name.
Previously users could work around this by just avoiding putting uppercase
letters in the name, but that is often inconvenient if e.g. the name is
being constructed from variables defined elsewhere that may already have
uppercase letters present.
2015-09-03 10:03:35 -07:00
David Radcliffe
987ec967ea
read source_dest_check and save to state
2015-09-02 14:04:45 -04:00
Clint
03aba6f6a3
Merge pull request #2986 from tphummel/aws_kinesis_stream-shard_count
...
aws_kinesis_stream: shard_count state fix
2015-08-31 09:43:40 -05:00
Clint Shryock
f174587291
provider/aws: touch up on aws_spot_instance
2015-08-31 09:34:34 -05:00
Clint
273d4fc98d
Merge pull request #2954 from stayup-io/issue_2919_pass_extra_settings_to_aws_spot_request
...
Pass key_name and subnetId to spot instance request - resolves issue #2919
2015-08-31 09:33:30 -05:00
Clint
81af6e18f8
Merge pull request #3043 from hashicorp/b-aws-paginate-asg-notifications
...
provider/aws: Paginate the notifications returned for ASG Notifications
2015-08-31 08:41:28 -05:00
Clint
64258c1efd
Merge pull request #3053 from hashicorp/b-aws-db-updates
...
provider/aws: Updates for RDS
2015-08-28 10:26:11 -05:00
Clint Shryock
fc0ccb957a
provider/aws: Add update method to DB Subnet Group
2015-08-24 16:52:30 -05:00
Clint Shryock
bd2adfce3b
update StateFunc to return empty string if maintenance_window not found
2015-08-24 11:25:43 -05:00
Clint Shryock
22e73d7b68
provider/aws: Lower case DB Instance's maintenance window
...
Fixes https://github.com/hashicorp/terraform/issues/2719
2015-08-24 11:08:19 -05:00
Radek Simko
00646b1d7b
ecs_service: Remove unused code
2015-08-23 17:45:52 +01:00
Radek Simko
9c2a3e79f9
ecs_service: Add note about race condition w/ IAM policy
...
- fixes #2902
2015-08-23 17:45:24 +01:00
Radek Simko
669d196a58
ecs_service: Role name can be used in iam_role (ARN was supported)
...
- fixes #2722
2015-08-23 17:42:15 +01:00
Radek Simko
fad019e950
ecs_service: Retry if IAM policy isn't ready yet
...
- fixes #2869
2015-08-23 17:37:29 +01:00
Clint Shryock
d793c6dbff
provider/aws: Updates for RDS
2015-08-21 16:58:34 -05:00
Clint Shryock
ba945f2ff7
update with test
2015-08-21 10:51:16 -05:00
Clint Shryock
ae0fbae176
provider/aws: Paginate the notifications returned for ASG Notifications
2015-08-20 17:27:35 -05:00
Clint Shryock
fde2a400f7
Merge branch 'master' into f-aws-pr-2779
...
* master: (84 commits)
provider/aws: Update to aws-sdk 0.9.0 rc1
use name instead of id - launch configs use the name and not ID
Fix typo on heroku_cert example
provider/aws: add value into ELB name validation message
tests: fix missed test update from last merge
update prevent_destroy error message
Update CHANGELOG.md
Update CHANGELOG.md
providers/aws: Update Launch Config. docs to detail naming and lifecycle recommendation
release: cleanup after v0.6.3
v0.6.3
Update CHANGELOG.md
core: fix deadlock when dependable node replaced with non-dependable one
tests: extract deadlock checking test helper
core: log every 5s while waiting for dependencies
Fixed indentation in a code sample
state/remote/s3: match with upstream changes
provider/aws: match with upstream changes
google: Add example of two-tier app
Updating Launch Config Docs for Name attribute
...
2015-08-18 14:40:01 -05:00
Clint Shryock
0c2f189d08
provider/aws: Update to aws-sdk 0.9.0 rc1
2015-08-17 13:27:16 -05:00
Sargurunathan Mohan
9abd74819e
apply go fmt on config.go
2015-08-16 17:13:23 -07:00
Tom Hummel
b68c23fb42
aws_kinesis_stream: remove limit on DescribeStream
...
using limit: 1 on DescribeStream will always return 1 shard no matter how many shards there actually are when we call `len()`. so i've removed the limit parameter to get the actual shard list returned
remove limits
2015-08-14 22:24:02 -07:00
Sargurunathan Mohan
b95e7a976c
fail silently when users have forbiddenaccount/allowedaccount configured while authenticating via iam profile instance
2015-08-14 03:52:38 -07:00
Paul Hinze
55411d692d
provider/aws: add value into ELB name validation message
...
makes debugging these validation errors much more straightforward
2015-08-13 16:31:18 -05:00
Paul Hinze
ca993a5a5e
provider/aws: match with upstream changes
2015-08-10 15:39:47 -05:00
Clint Shryock
eb90457223
guard on both accessdenied (no IAM policy) and validationerror (no username specified)
2015-08-07 11:55:44 -05:00
Clint Shryock
31fab62bfd
provider/aws: Fail silently in ValidateCredentials for IAM users
2015-08-07 11:40:50 -05:00
David Laing
79d8fde09c
Pass key_name and subnetId to spot instance request
2015-08-06 20:22:10 +01:00
Clint Shryock
c1daf23a5d
provider/aws: Fix issues with TestAccAWSPolicyAttachment_basic
2015-08-06 09:47:35 -05:00
Clint Shryock
a1a78bd482
provider/aws: Add ARN to Dynamo schema
2015-08-05 14:43:26 -05:00