Commit Graph

227 Commits

Author SHA1 Message Date
Mitchell Hashimoto 623c635fb1 providers/aws: can create records with multiple values [GH-221] 2014-08-22 17:19:39 -07:00
Mitchell Hashimoto c886148e15 providers/aws: use example.com for tests 2014-08-22 12:51:19 -07:00
Mitchell Hashimoto ed99d2497b providers/aws: retry route53 operations [GH-183] 2014-08-22 12:51:11 -07:00
Mitchell Hashimoto 8f70920c17 providers/aws: fix some other issues with aws_instance 2014-08-22 12:20:06 -07:00
Mitchell Hashimoto ba68be5672 providers/aws: use StateFunc to process the user_data 2014-08-22 08:46:48 -07:00
Mitchell Hashimoto f26a2700a1 fmt 2014-08-22 08:46:03 -07:00
Mitchell Hashimoto 7be2f1b091 helper/schema: add GetOk 2014-08-21 23:03:04 -07:00
Mitchell Hashimoto 2fd2470c92 providers/aws: resource_aws_instance partially to schema.Resource 2014-08-21 18:38:43 -07:00
Alek Storm b6c5e5bbf6 Allow aws_instance private IP's to be specified 2014-08-21 17:13:36 -07:00
Mitchell Hashimoto cdc2a53553 providers/aws: changing order of security group cidrs doesn't affect
things
2014-08-21 14:10:09 -07:00
Mitchell Hashimoto 5b620b76f5 providers/aws: update comment 2014-08-21 12:00:32 -07:00
Mitchell Hashimoto 200f7c4488 providers/aws: can add remove individual cidr/groups in security group 2014-08-21 11:59:03 -07:00
Mitchell Hashimoto 4015d942ab providers/aws: security group ingress rules treated as set [GH-87]
/cc @pearkes - !!!
2014-08-20 22:24:13 -07:00
Jack Pearkes 6eb6d19384 providers/aws: vpc dns settings tests
cc/ @deoxxa see diff for how to add tests – quite straight forward.

Normally, I would like to add a check to ensure that the attribute
was updated remotely (by seeing what it's value with AWS is) but
I don't think we have that value returned.
2014-08-20 11:29:52 -07:00
Mitchell Hashimoto 53cdbcc9fa providers/aws: security group ingress rules can be updated 2014-08-20 11:18:16 -07:00
Mitchell Hashimoto a594ef9a28 providers/aws: expandIPPerms works again 2014-08-20 11:18:16 -07:00
Jack Pearkes 33a7d32f40 Merge pull request #172 from deoxxa/add-vpc-dns-attributes
add vpc dns attribute support
2014-08-20 11:14:07 -07:00
Jack Pearkes 97cae408b2 providers/aws: tests and document adding load balancers to autoscaling
cc/ @thatha
2014-08-20 10:42:14 -07:00
Mitchell Hashimoto 89041c0595 providers/aws: resource_aws_security_group using helper/schema 2014-08-20 10:40:18 -07:00
Ian Atha 13b0e7ee2c Allow 'load_balancers.*' to pass resource_aws_autoscaling_group_validation 2014-08-19 19:53:12 -07:00
Mitchell Hashimoto d25747ba5c providers/aws: cleaner detection of VPC [GH-122] 2014-08-19 17:22:25 -07:00
Mitchell Hashimoto c4d261ac61 providers/aws: resource_aws_eip is in new framework 2014-08-19 16:56:23 -07:00
Mitchell Hashimoto 776bb22e4e providers/aws: create an empty schema.Provider 2014-08-19 15:40:48 -07:00
Jack Pearkes d99e475ea2 Merge pull request #170 from alekstorm/aws-security-group-owner
Implement specification of AWS security groups in ingress rules as <owner>/<id>
2014-08-19 09:42:05 -07:00
Jack Pearkes 4cdb95a6b2 Merge pull request #166 from alekstorm/aws-elb-subnets-security-groups
Add 'security_groups' and 'subnets' args to 'aws_elb'
2014-08-19 09:40:30 -07:00
Mitchell Hashimoto ca5be43519 providers/aws: fix RDB test syntax error 2014-08-11 09:58:53 -07:00
deoxxa 4405a8d974 add vpc dns attribute support 2014-08-09 22:43:00 +10:00
Alek Storm 7109b8c770 Implement specification of AWS security groups in ingress rules as <owner>/<id> 2014-08-08 11:51:18 -07:00
Alek Storm 5a84296c61 Add 'security_groups' and 'subnets' args to 'aws_elb' 2014-08-07 17:41:15 -07:00
Alex Gaynor 46154ca1d3 Fixed a ton of typos in docs and comments 2014-08-07 00:19:56 -07:00
Hector Castro f869a077a2 Fix output of aws_db_instance port via endpoint
When trying to output the `endpoint` attribute of an `aws_db_instance`,
the port was not being emitted properly. Converting the port number from
an integer to a string has resolved the issue.
2014-08-01 17:13:26 -04:00
Jack Pearkes c6741cf1b5 providers/aws: add tests for instance availability zone
cc/ @dcosson here we go!
2014-07-31 20:35:31 -04:00
Jack Pearkes aa94e0c41a Merge pull request #129 from dcosson/aws_availability_zone
Allow specifying the AWS availability zone on creation
2014-07-31 15:28:34 -04:00
Jack Pearkes e07dc8891d providers/aws: db instance wait for destroy, allow destroy config 2014-07-31 15:22:14 -04:00
Danny Cosson e838624468 Allow specifying the AWS availability zone on creation 2014-07-31 13:52:03 -04:00
Jack Pearkes 0ca0b8dd62 providers/aws: remove password from resource diff to not trigger changes
cc/ @mitchellh

This one caught me a bit, and I'm not sure if there's another AttrType
that could be useful here – perhaps a AttrTypeHidden or something? I
don't know...this feels sloppy to have in the diff func.
2014-07-31 09:39:19 -04:00
Jack Pearkes 9a2685cf13 providers/aws: db instances now depend on db security groups 2014-07-31 09:28:25 -04:00
Jack Pearkes bc79f15db3 providers/aws: require description in security groups. fixes #123 2014-07-30 17:15:51 -04:00
Jack Pearkes 60ed50b4b6 providers/aws: allow "modifying" as pending state for db instances
fixes #119
2014-07-30 11:58:11 -04:00
John Wards 7493ee31cb Stop passing engine into EngineVersion
Fixes #95
2014-07-30 16:44:02 +01:00
Jack Pearkes 7adc6162d8 providers/aws: add test for health check, save health check state
cc/ @vertis

I added an acceptance test here, as well as making it so we
saved the health check state on update_state.
2014-07-30 10:15:22 -04:00
Luke Chadwick 0eed0908df Add health_check to aws_elb resource 2014-07-30 21:46:51 +10:00
Jack Pearkes af62002c1b go fmt 2014-07-29 19:09:55 -04:00
Jack Pearkes 77697b9936 providers/aws: add failing test for aws region validation
cc/ @jorgeng87
2014-07-29 19:09:17 -04:00
Jorge Núñez aad0fec940 Update test with valid AWS region 2014-07-30 00:22:50 +02:00
Jorge Núñez 5900b3f1c0 Add AWS region validation 2014-07-30 00:22:37 +02:00
Luke Chadwick 15bdf8b5f9 Add user_data to aws_launch_configuration 2014-07-30 07:30:24 +10:00
Jack Pearkes cbcb559c0c providers/aws: add failing test for reorder ingress rules bug 2014-07-29 15:03:51 -04:00
Jack Pearkes 6653542466 providers/aws: fix order of ingress rules on security group 2014-07-29 12:45:57 -04:00
Jack Pearkes dbe6b74884 providers/aws: depend on security groups, failing test for #87 2014-07-29 12:15:42 -04:00