Commit Graph

10669 Commits

Author SHA1 Message Date
James Nugent 28a84e3f4e Merge pull request #6534 from arsdehnel/patch-1
Document change in CLI behavior
2016-05-08 19:37:05 -04:00
James Nugent a4f30133df Merge pull request #6539 from hashicorp/aws-cloudtrail-test-updates
provider/aws: CloudTrail tests were failing as the names were not unique per test run
2016-05-08 19:35:59 -04:00
James Nugent 26ffa0452d Update CHANGELOG.md 2016-05-08 19:35:04 -04:00
James Nugent 5366fabad1 Merge pull request #4401 from stack72/aws-rds-option-groups
provider/aws: aws_db_option_group
2016-05-08 19:34:15 -04:00
Paul Stack 526aadd0ea Update resource_aws_db_option_group.go 2016-05-09 00:33:48 +01:00
James Nugent dc3a78eac8 Update CHANGELOG.md 2016-05-08 19:22:42 -04:00
James Nugent 6ca0e0064a Merge pull request #6541 from hashicorp/fix-azurerm-vm-ssh-key
provider/azurerm: Fix an issue with `azurerm_virtual_machine` ssh_keys
2016-05-08 19:20:44 -04:00
James Nugent b59d6c8ce1 Merge pull request #6542 from hashicorp/azurerm-vm-validation
provider:azurerm: Add documentation for `azurerm_virtual_machine` adminPassword
2016-05-08 19:16:51 -04:00
stack72 fdb9293635 provider:azurerm: Add documentation for `azurerm_virtual_machine`
adminPassword

Reports from issues showed the following errors:

```
{
    "error": {
            "code": "InvalidParameter",
                    "target": "adminPassword",
                            "message": "The supplied password must be
                            between 6-72 characters long and must
                            satisfy at least 3 of password complexity
                            requirements from the following: \r\n1)
                            Contains an uppercase character\r\n2)
                            Contains a lowercase character\r\n3)
                            Contains a numeric digit\r\n4) Contains a
                            special character."

    }

}
```

This commit adds some documentation for the adminPassword complexity
requirements
2016-05-08 23:07:04 +01:00
stack72 712fc83a20 provider/azurerm: Fix an issue with `azurerm_virtual_machine` ssh_keys
ssh_keys were throwing an error similar to this:

```
* azurerm_virtual_machine.test: [DEBUG] Error setting Virtual Machine
* Storage OS Profile Linux Configuration: &errors.errorString{s:"Invalid
* address to set: []string{\"os_profile_linux_config\", \"0\",
* \"ssh_keys\"}"}
```

This was because of nesting of Set within a Set in the schema. By
changing this to a List within a Set, the schema works as expected. This
means we can now set SSH Keys on VMs. This has been tested using a
remote-exec and a connection block with the ssh key

```
azurerm_virtual_machine.test: Still creating... (2m10s elapsed)
azurerm_virtual_machine.test (remote-exec): Connected!
azurerm_virtual_machine.test (remote-exec): CONNECTED!
```
2016-05-08 22:51:51 +01:00
stack72 8dc123fd94 Scaffold the AWS DB Option Group resource
Change the AWS DB Instance to now include the DB Option Group param. Adds a test to prove that it works

Add acceptance tests for the AWS DB Option Group work. This ensures that Options can be added and updated

Documentation for the AWS DB Option resource
2016-05-08 20:18:53 +01:00
Paul Stack 1c3fff19d0 Update CHANGELOG.md 2016-05-08 19:30:21 +01:00
Paul Stack dc30bd29fc provider/aws: Redshift Cluster not allowing 0 for (#6537)
automated_snapshot_retention_period

The default value for `automated_snapshot_retention_period` is 1.
Therefore, it can be included in the `CreateClusterInput` without
needing to check that it is set.

This was actually stopping people from setting the value to 0 (disabling
the snapshots) as there is an issue in `d.GetOk()` evaluating 0 for int
2016-05-08 19:29:36 +01:00
stack72 1937d0fb6a provider/aws: CloudTrail tests were failing as the names were not unique
per test run
2016-05-08 19:08:58 +01:00
Jason Wieringa 57a1001ac0 Fix documentation on autoscaling group (#6532)
As of sha d3697fa50b, enabled_metrics
is an optional setting.
2016-05-08 18:03:24 +01:00
arsdehnel 61c7cf9457 Change in CLI behavior
Just wanted to call out that the CLI prompts for values for unset variables instead of an error.  Guessing that was an enhancement somewhere along the line and just didn't get updated in the docs.
2016-05-07 20:52:06 -05:00
James Nugent 46702ad918 Update CHANGELOG.md 2016-05-07 12:38:47 -07:00
James Nugent dd7da5a951 Merge pull request #6529 from hashicorp/f-triton-firewall-rule-exists
provider/triton: Recognize 404 for Firewall Rules
2016-05-07 12:36:46 -07:00
James Nugent 6e602b5dce deps: Update github.com/hashicorp/go-retryablehttp 2016-05-06 17:43:00 -07:00
James Nugent 84b79dbb9f deps: Fix Amazon EMR Godep package ref 2016-05-06 17:38:34 -07:00
James Nugent 747c8387d4 deps: Actually update Riviera files 2016-05-06 17:36:25 -07:00
James Nugent 2bfa8c9836 deps: Update github.com/jen20/riviera/... 2016-05-06 17:32:30 -07:00
James Nugent f364265900 provider/triton: Recognize 404 for Firewall Rules 2016-05-06 16:51:20 -07:00
Paul Stack 49085d58b9 Update CHANGELOG.md 2016-05-07 00:14:52 +01:00
James Nugent 78283a95bc Merge pull request #6528 from hashicorp/b-arm-update-vm
provider/azurerm: Update `azurerm_virtual_machine` failed on adminPassword
2016-05-06 16:12:26 -07:00
stack72 2e174ca3d4 provider/azurerm: Update `azurerm_virtual_machine` failed on
adminPassword

The Azure API never returns the AdminPAssword (as is correct) from the
Read API call. Therefore on Create, we do not set the AdminPassword of
the vm as part of the state. The Same func is used for Create & Update,
therefore when we changed anything on the VM, we were getting the
following error:

```
statusCode:Conflict
serviceRequestId:f498a6c8-6e7a-420f-9788-400f18078921
statusMessage:{"error":{"code":"PropertyChangeNotAllowed","target":"adminPassword","message":"Changing property 'adminPassword' is not allowed."}}
```

To fix this, we need to excldue the AdminPassword from the Update func
if it is empty
2016-05-06 23:44:03 +01:00
Clint 10d3989585 Update CHANGELOG.md for AWS EIP change (#6525)
* Update CHANGELOG.md noting the change in aws_eip field private_ip
2016-05-06 15:49:06 -05:00
Clint 99e0aec769 provider/aws: Fix issue changing EIP Association (#6521)
provider/aws: Update EIP to use new associate_with_private_ip instead of private_ip
2016-05-06 15:38:39 -05:00
Radek Simko f0cf6564ad Update CHANGELOG.md 2016-05-06 18:01:48 +01:00
John Engelman 14f6f90621 Support standard AWS config in the S3 remote backend. (#5270) 2016-05-06 17:52:18 +01:00
KOJIMA Kazunori 2476dcbcae provider/aws: Fix typo in error message (#6518) 2016-05-06 09:57:04 -05:00
James Nugent f1031707f9 Update CHANGELOG.md 2016-05-05 21:51:45 -07:00
James Nugent 3785ea3c43 Merge pull request #6509 from meteor/glasser/datadog-schema
provider/datadog: fix code to match schema
2016-05-05 21:50:32 -07:00
David Glasser bef1b58fda provider/datadog: fix code to match schema
On Create, notify_no_data was being ignored.

On Read and Update, no_data_timeframe was being misused.

There was also a redundant read of escalation_message on Create.
2016-05-05 16:51:17 -07:00
Paul Stack df4ccdf5fa Update CHANGELOG.md 2016-05-05 22:59:39 +01:00
Justin Clark 380ada1019 provider/aws: Add agent_version argument to AWS_OPSWORKS_STACK 2016-05-05 22:56:44 +01:00
clint shryock 8129c0589c provider/aws: Require cookies for Cloudfront Distributions 2016-05-05 15:44:35 -05:00
Radek Simko 0648941063 Update CHANGELOG.md 2016-05-05 21:15:59 +01:00
Greg Thole ebfc701265 provider/aws: AWS API Gateway request parameters json (#6501)
* Update docs with new parameters

* Add request parameters as JSON

* Update function name and error statements
2016-05-05 21:14:51 +01:00
Radek Simko 03bc54b438 Merge pull request #6500 from hashicorp/radeksimko-patch-1
aws: Update docs after #6385 (account ID via sts)
2016-05-05 18:01:33 +01:00
Radek Simko d23fac3a28 aws: Update docs after #6385 (account ID via sts) 2016-05-05 17:51:44 +01:00
Radek Simko 069636ae9f Update CHANGELOG.md 2016-05-05 17:37:25 +01:00
Radek Simko e32a8c1c5b Merge pull request #6385 from Ticketmaster/use-sts-GetCallerIdentity
provider/aws: Added sts:GetCallerIdentity to GetAccountId for federated logins
2016-05-05 17:35:32 +01:00
Clint 351701ec39 Update CHANGELOG.md 2016-05-05 10:49:32 -05:00
Clint c58892485b provider/aws: Allow empty S3 config in Cloudfront Origin (#6487)
* provider/aws: Allow empty S3 config in Cloudfront Origin
2016-05-05 10:49:09 -05:00
Clint be74cb2892 Update CHANGELOG.md 2016-05-05 10:18:28 -05:00
Clint 068f6f606d provider/aws: Fix issue in upgrading AutoScaling Policy (#6440)
* provider/aws: Fix issue in upgrading AutoScaling Policy min_adjustment_steps

- Update depreciation message on min_adjustment_step
2016-05-05 10:17:54 -05:00
thetuxkeeper 83f87e3741 fixed ipv6 - changed to Computed like ipv4 (#6480) 2016-05-05 15:38:45 +01:00
Kraig Amador a23bcf2ec9 Added accountid to AWSClient and set it early in the initialization phase. We use iam.GetUser(nil) scattered around to get the account id, but this isn't the most reliable method. GetAccountId now uses one more method (sts:GetCallerIdentity) to get the account id, this works with federated users. 2016-05-05 07:02:12 -07:00
Kraig Amador e04e87361f vendor: Updated github.com/aws/aws-sdk-go to v1.1.23 The new STS library includes GetCallerIdentity which can be used to build ARNs for RDS resources when using IAM roles 2016-05-05 07:02:10 -07:00