Commit Graph

14209 Commits

Author SHA1 Message Date
Mitchell Hashimoto 646b3c1b68 Merge pull request #9158 from hashicorp/f-vault-provider
Vault Provider
2016-11-08 15:27:33 -08:00
Paddy 11b05de147 Merge pull request #9975 from hashicorp/paddy_fix_google_sidebar
Fix typo in the Google sidebar.
2016-11-08 14:50:11 -08:00
Paddy 9d4bedee0c Fix typo in the Google sidebar.
We have Google Compute Platform when we really mean Google Cloud
Platform. Whoops. I totally let this sneak in in #9969.
2016-11-08 14:09:17 -08:00
Raphael Randschau b0772b9131 provider/scaleway: retry volume attachment create/ destroy (#9972)
this PR fixes a flakyness in the `scaleway_volume_attachment` resource, as
described below:

when attaching/ detaching a volume from a `scaleway_server`, the server needs to
be stopped. even though the code already waits for the server to be stopped, the
`PatchServer` calls gets a `400 server is being stopped or rebooted` error
response.

If the API returns the `400` we bail, leaving terraform in a broken state.

Assuming this is the only error that the API might return to us, as the payload
itself is correct, this retry behaviour should fix the issue.

\cc @stack72 PTAL
2016-11-08 21:57:33 +00:00
Paul Stack d7ab7c029b Update CHANGELOG.md 2016-11-08 21:57:18 +00:00
Paddy a466aaf639 Merge pull request #9969 from cblecker/f-google-docs-sidebar-update
provider/google: Add google_iam_policy and google_project to sidebar
2016-11-08 13:53:53 -08:00
Mitchell Hashimoto dfab66e550 Update CHANGELOG.md 2016-11-08 13:02:33 -08:00
Mitchell Hashimoto 3bc26db4e0 Merge pull request #9968 from hashicorp/b-destroy-self-ref
terraform: destroy edges should never point to self
2016-11-08 13:01:56 -08:00
Christoph Blecker 2eeb9fbf86
Add google_iam_policy and google_project to sidebar 2016-11-08 12:55:53 -08:00
Clint dd76c99301 Update CHANGELOG.md 2016-11-08 14:32:54 -06:00
Mitchell Hashimoto fb29b6a2dc
terraform: destroy edges should never point to self
Fixes #9920

This was an issue caught with the shadow graph. Self references in
provisioners were causing a self-edge on destroy apply graphs.

We need to explicitly check that we're not creating an edge to ourself.
This is also how the reference transformer works.
2016-11-08 12:27:33 -08:00
Paddy 8eb4678972 Update CHANGELOG.md 2016-11-08 11:04:21 -08:00
Paddy 78f8fea1fa Merge pull request #9950 from optimisticanshul/9928-aws-redshift-enhanced-vpc-routing
Added AWS Redshift Enhanced VPC Routing
2016-11-08 11:02:37 -08:00
Clint 81e599e53f Merge pull request #9600 from HotelsDotCom/master
AWS EMR resource - Support for Service Access Security Group
2016-11-08 11:36:03 -06:00
Paddy 1a4906f263 Update CHANGELOG.md 2016-11-08 09:04:35 -08:00
Paddy 9a1f050971 Merge pull request #9942 from hashicorp/paddy_6495_invalid_disk_crash
provider/google: throw an error for invalid disks
2016-11-08 09:03:18 -08:00
Mitchell Hashimoto b07c50f1d9 Merge pull request #9957 from jamtur01/consul
Minor tidying of the Consul documentation
2016-11-08 08:38:06 -08:00
James Turnbull b0e9a3f39b Fixed comma typo 2016-11-08 16:08:46 +01:00
James Turnbull 2f61c89c10 Fixed weird cnp 2016-11-08 16:07:43 +01:00
James Turnbull 464d63b890 Minor tidying of the Consul documentation 2016-11-08 15:43:00 +01:00
Anshul Sharma e9821eaced Updated Redshift Documentation and Added Test Cases for Redshift Enchaned VPC routing 2016-11-08 18:13:10 +05:30
Anshul Sharma 1030cc1344 Added AWS Redshift Enhanced VPC Routing 2016-11-08 17:36:29 +05:30
Paddy 8ba6ed708a provider/google: throw an error for invalid disks
When configuring an instance's attached disk, if the attached disk has
both the disk and type attributes set, it would previously cause
terraform to crash with a nil pointer exception. The root cause was that
we only instantiate the InitializeParams property of the disk if its
disk attribute isn't set, and we try to write to the InitializeParams
property when the type attribute is set. So setting both caused the
InitializeParams property to not be initialized, then written to.

Now we throw an error explaining that the configuration can't have both
the disk and the type set.

Fixes #6495.
2016-11-07 16:11:00 -08:00
Clint 2c2c02ab62 Merge pull request #9936 from bljordan/bjordan/spot_datafeed_subscription_docs
Update documentation for aws_spot_datafeed_subscription.
2016-11-07 16:50:47 -06:00
Ben Jordan 5902922c7c Update documentation for aws_spot_datafeed_subscription. 2016-11-07 15:48:11 -07:00
Paul Stack 4c675be43e Update CHANGELOG.md 2016-11-07 21:02:45 +00:00
Paul Stack 38cd7947b6 provider/aws: Fix the validateFunc of aws_elasticache_replication_group (#9918)
Fixes #9895

The replication_group_id should allow length to be max of 20 not 16

```
% make testacc TEST=./builtin/providers/aws TESTARGS='-run=TestResourceAWSElastiCacheReplicationGroupIdValidation'
==> Checking that code complies with gofmt requirements...
go generate $(go list ./... | grep -v /terraform/vendor/)
2016/11/07 16:17:52 Generated command/internal_plugin_list.go
TF_ACC=1 go test ./builtin/providers/aws -v
-run=TestResourceAWSElastiCacheReplicationGroupIdValidation -timeout
120m
=== RUN   TestResourceAWSElastiCacheReplicationGroupIdValidation
--- PASS: TestResourceAWSElastiCacheReplicationGroupIdValidation (0.00s)
PASS
ok      github.com/hashicorp/terraform/builtin/providers/aws0.032s
```
2016-11-07 21:02:00 +00:00
Paul Stack bf1a13e3d2 Update CHANGELOG.md 2016-11-07 20:18:16 +00:00
Paul Stack c0442ee63f provider/aws: aws_alb_target_group arn_suffix missing the targetgroup (#9911)
The work to add the arn_suffix in #9734 skipped adding the targetgroup/
part of the arn

This PR adds it

//cc @firthh

```
% make testacc TEST=./builtin/providers/aws TESTARGS='-run=TestAccAWSALBTargetGroup_'
==> Checking that code complies with gofmt requirements...
go generate $(go list ./... | grep -v /terraform/vendor/)
2016/11/07 12:19:16 Generated command/internal_plugin_list.go
TF_ACC=1 go test ./builtin/providers/aws -v -run=TestAccAWSALBTargetGroup_ -timeout 120m
=== RUN   TestAccAWSALBTargetGroup_basic
--- PASS: TestAccAWSALBTargetGroup_basic (47.23s)
=== RUN   TestAccAWSALBTargetGroup_changeNameForceNew
--- PASS: TestAccAWSALBTargetGroup_changeNameForceNew (80.09s)
=== RUN   TestAccAWSALBTargetGroup_changeProtocolForceNew
--- PASS: TestAccAWSALBTargetGroup_changeProtocolForceNew (87.45s)
=== RUN   TestAccAWSALBTargetGroup_changePortForceNew
--- PASS: TestAccAWSALBTargetGroup_changePortForceNew (78.47s)
=== RUN   TestAccAWSALBTargetGroup_changeVpcForceNew
--- PASS: TestAccAWSALBTargetGroup_changeVpcForceNew (73.53s)
=== RUN   TestAccAWSALBTargetGroup_tags
--- PASS: TestAccAWSALBTargetGroup_tags (75.60s)
=== RUN   TestAccAWSALBTargetGroup_updateHealthCheck
--- PASS: TestAccAWSALBTargetGroup_updateHealthCheck (76.40s)
PASS
ok  	github.com/hashicorp/terraform/builtin/providers/aws	518.777s
```
2016-11-07 20:17:43 +00:00
Mitchell Hashimoto 7d6b3b80b9
website: document escaping template vars [GH-9897] 2016-11-07 08:42:46 -08:00
Paul Stack 7dec4acfca Update CHANGELOG.md 2016-11-07 16:14:09 +00:00
Paul Stack 3f032ff611 provider/aws: Setting static_routes_only on import of vpn_connection (#9802)
fixes #9110

An error was found where, static_routes_only was not set on a vpn
connection import. This commit introduces setting the static_routes_only
to false when no Options are found. This follows the AWS convention as follows:

```
- options (structure)

Indicates whether the VPN connection requires static routes. If you are creating a VPN connection for a device that does not support BGP, you must specify true .
Default: false

```

So we take it that `static_options_only` is false by default

```
% make testacc TEST=./builtin/providers/aws TESTARGS='-run=TestAccAWSVpnConnection_'
==> Checking that code complies with gofmt requirements...
go generate $(go list ./... | grep -v /terraform/vendor/)
2016/11/02 10:38:18 Generated command/internal_plugin_list.go
TF_ACC=1 go test ./builtin/providers/aws -v -run=TestAccAWSVpnConnection_ -timeout 120m
=== RUN   TestAccAWSVpnConnection_importBasic
--- PASS: TestAccAWSVpnConnection_importBasic (178.29s)
=== RUN   TestAccAWSVpnConnection_basic
--- PASS: TestAccAWSVpnConnection_basic (336.81s)
=== RUN   TestAccAWSVpnConnection_withoutStaticRoutes
--- PASS: TestAccAWSVpnConnection_withoutStaticRoutes (195.45s)
PASS
ok  	github.com/hashicorp/terraform/builtin/providers/aws	710.572s
```
2016-11-07 16:12:41 +00:00
Mitchell Hashimoto 5440874268 Update CHANGELOG.md 2016-11-07 08:01:25 -08:00
Peter McAtominey 2449cfbf1c provider/azurerm: improve formatting of client_config docs (#9915) 2016-11-07 16:00:58 +00:00
Mitchell Hashimoto f580a8ed7b Merge pull request #9894 from hashicorp/b-provider-alias
terraform: configure provider aliases in the new apply graph
2016-11-07 07:59:33 -08:00
Mitchell Hashimoto 1beda4cd07 Merge pull request #9898 from hashicorp/b-new-ref-existing
terraform: remove pruning of module vars if they ref non-existing nodes
2016-11-07 07:59:25 -08:00
Mitchell Hashimoto b010f8c864 Merge pull request #9883 from hashicorp/b-multi-order
terraform: multi-var ordering is by count
2016-11-07 07:59:16 -08:00
Patrick Decat 4be9a42ab0 Fix deprecation warnings for automatic_restart and on_host_maintenance parameters (#9909)
Fix 
Warnings:

```
  * google_compute_instance_template.nat: "automatic_restart": [DEPRECATED] Please use `scheduling.automatic_restart` instead
  * google_compute_instance_template.nat: "on_host_maintenance": [DEPRECATED] Please use `scheduling.on_host_maintenance` instead
```
2016-11-07 10:42:38 +00:00
Paul Stack 31a685e29b Update CHANGELOG.md 2016-11-07 10:37:54 +00:00
Masayuki Morita f68d5e82f3 provider/aws: Fix bug #9863 destroying aws_iam_user with force_destroy does not work (#9900) 2016-11-07 10:37:32 +00:00
Paul Stack 517d319c2c Update CHANGELOG.md 2016-11-07 10:20:42 +00:00
Tom Harvey b15b7e1c40 provider/azurerm: EventHubs (#9889)
* Implemented EventHubs

* Missing the sidebar link

* Fixing the type

* Fixing the docs for Namespace

* Removing premium tests

* Checking the correct status code on delete

* Added a test case for the import

* Documentation for importing

* Fixing a typo
2016-11-07 10:19:59 +00:00
James Nugent a0c5d42fa4 provider/random: Separate read from create
We now generate the read operation which sets the various encodings of
the random value such that adding new ones does not require generating a
new random value.

We also verify that these are set correctly via the acceptance tests.
2016-11-06 17:05:11 -06:00
James Nugent 5ba1c4ed2c Update CHANGELOG.md 2016-11-06 16:26:21 -06:00
James Nugent 65a8c7bb3f Merge pull request #9903 from hashicorp/random-std-b64-encoding
provider/random: Add b64_std to random_id
2016-11-06 16:25:08 -06:00
James Nugent 9f4e1ec5eb Merge pull request #9865 from sthulb/remove-dep-mime/multipart
Remove sthulb/mime/multipart
2016-11-06 10:24:45 -06:00
James Nugent 4c99807448 Merge pull request #9842 from AndHei/patch-2
"aws_sns_topic_subscription" add further clarification for cross acco…
2016-11-06 10:21:39 -06:00
James Nugent 28a3cdc399 Merge pull request #9901 from AndHei/patch-3
Correct ambiguous aws_vpc_peering_connection docs
2016-11-06 10:18:08 -06:00
James Nugent a7451bfab3 provider/random: Use schema Noop functions 2016-11-06 10:07:38 -06:00
James Nugent 314a56e503 provider/random: Add b64_std to random_id
This commit makes three related changes to the `random_id` resource:

1. Deprecate the `b64` attribute
2. Introduce a new `b64_url` attribute which functions in the same
   manner as the original `b64` attribute
3. Introduce a new `b64_std` attribute which uses standard base64
   encoding for the value rather than URL encoding.

Resource identifiers continue to use URL encoded base 64.

The reason for adding standard encoding of the base 64 value is to allow
the use of generated values as a Serf Encryption Key for separating
Consul clusters - these rely on standard encoding and do not permit some
characters which are allowed by URL encoding. `b64_url` is introduced
in order that there is consistency in specifying the desired encoding
during interpolation.
2016-11-06 09:58:24 -06:00