Commit Graph

747 Commits

Author SHA1 Message Date
Radek Simko d60f22809f Merge pull request #5029 from TimeIncOSS/f-aws-iam-pass-policy
provider/aws: Add support for account password policy
2016-02-26 13:36:46 +00:00
Radek Simko 1686a1023c provider/aws: Add docs for AWS Account Password Policy resource 2016-02-26 13:29:34 +00:00
Radek Simko adec84d8e6 provider/aws: Document how to update s3_bucket_object 2016-02-25 19:56:42 +00:00
James Nugent 5b548e938c Merge pull request #5327 from Originate/s3-website-routing-rules
Added routing rules to s3 buckets
2016-02-25 14:43:55 -05:00
Drew Minnear ef50479e8a added routing rules to s3 buckets 2016-02-25 10:19:23 -08:00
Akram Hussein f887b70964 aws_cloudwatch_metric_alarm docs reference 'namespace' twice. 2016-02-24 12:39:22 +00:00
Paul Stack e454b21100 Merge pull request #5271 from stack72/f-aws-dynamodb-stream-arn
provider/aws: Enable DynamoDB Table to output `stream_arm` when streams are enabled
2016-02-23 17:27:22 +00:00
stack72 8d6cfe8e89 Implement RetentionPeriod Changes for AWS Kinesis Stream 2016-02-23 17:15:33 +00:00
stack72 0ce4aed52a provider/aws: Enable DynamoDB Table to output `stream_arm` when streams
are enabled
2016-02-23 15:40:41 +00:00
Paul Stack 57f58dec98 Merge pull request #5262 from stack72/b-aws-redshift-cluster-public
provider/aws: `aws_redshift_cluster` publicly_accessible now defaults true
2016-02-22 23:19:30 +00:00
stack72 e822d46843 provider/aws: `aws_redshift_cluster` publicly_accessible now defaults to
true
2016-02-22 23:11:55 +00:00
Paul Stack d5fb018250 Merge pull request #4945 from stack72/aws-rds-enhanced-monitoring
provider/aws: Enabled Enhanced Monitoring for RDS
2016-02-22 22:02:09 +00:00
James Nugent 16b18df1fd Merge pull request #5238 from stack72/f-aws-redshift-calculate-cluster
provider/aws: Change Redshift Cluster cluster_type to be computed
2016-02-22 13:18:09 -05:00
Paul Stack 30dcc45635 Merge pull request #5178 from hashicorp/f-aws-iam-server-updates
provider/aws: Update IAM Server Cert
2016-02-22 18:07:22 +00:00
stack72 e6e18a4a9e provider/aws: Change Redshift Cluster cluster_type to be computed
It will be based off the number of nodes. Can only be multi-node (>1
node) or single-node (nodes=1)
2016-02-21 19:42:02 +00:00
Joshua Garnett 12958fb5e7 Added support for the deployment configuration settings to the ecs service resource. 2016-02-19 15:32:39 -05:00
clint shryock c8178ad31c provider/aws: Update IAM Server Cert to allow name_prefix, auto generated namesprovider/aws: Update IAM Server Cert to allow name_prefix, auto generated namesdiff 2016-02-17 16:34:02 -06:00
James Nugent f7504f7f9f Merge branch 'master' of https://github.com/vincer/terraform into vincer-master 2016-02-17 13:16:16 -08:00
Clint 1ba59994e8 Merge pull request #5124 from steve-jansen/patch-2
Link aws_ami_copy documentation to aws_ami
2016-02-17 10:40:32 -06:00
Paul Stack cd28433c2a Merge pull request #4826 from TimeIncOSS/f-aws-lambda-permission
[WIP] provider/aws: Add aws_lambda_permission
2016-02-17 13:31:29 +00:00
Paul Stack 77deff1194 Merge pull request #5135 from TimeIncOSS/f-aws-cloudtrail-tags
provider/aws: Add support for CloudTrail tags
2016-02-16 21:55:45 +00:00
vince rosso 2b43a317a9 documentation for lambda in VPC 2016-02-16 12:16:43 -08:00
Paulo Schreiner 7293ab99d3 Added option to attach an ELB to Opsworks layer 2016-02-16 09:44:15 -06:00
Radek Simko f53ea0b4a4 provider/aws: Add docs for aws_lambda_permission 2016-02-15 17:16:41 +00:00
Radek Simko fa92e7bd87 provider/aws: Add docs for CloudTrail tags 2016-02-15 14:11:48 +00:00
Radek Simko fdd9c3b2b8 Merge pull request #4711 from srikalyan/master
Added support for http/https endpoints that auto confirms SNS topic subscription.
2016-02-14 21:13:22 +00:00
Steve Jansen 6c680a6a17 Link aws_ami_copy documentation to aws_ami
Clarify that aws_ami_copy can use the arguments from aws_ami.
2016-02-13 08:36:09 -05:00
Radek Simko e288b161d7 provider/aws: Document CloudWatch Events 2016-02-13 13:21:33 +00:00
Srikalyan Swayampakula f21dc995c5 Update code based on the review suggestions.
1. Used resource.Retry instead of custom solution
2. Removed unnecessary variables and added required variable to resource.Retry.
2016-02-12 12:21:52 -08:00
Clint 169b63e401 Merge pull request #5032 from clstokes/f-aws-gateway-tunnel-info
provider/aws: Expose additional VPN Connection attributes.
2016-02-12 10:31:23 -06:00
Hasan Türken 766dac4d79 update documentation 2016-02-12 09:56:48 -06:00
Hasan Türken e41266e971 Move endpoint options into endpoints block 2016-02-12 09:38:21 -06:00
Hasan Türken 231604e8b7 support custom endpoints for AWS EC2 ELB and IAM 2016-02-12 09:35:50 -06:00
Clint a6d3c4e181 Merge pull request #5087 from vmindru/master
aws_instance docs
2016-02-12 09:09:21 -06:00
Shane O'Grady 86f791aa2b Fix a typo: "encryption" to "encrypted"
Ref PR: #4481
2016-02-12 10:46:05 -02:00
Srikalyan Swayampakula 5f558c0536 Updated the documentation to include the defaults for the remaining fields added in the PR
and add the link to amazon describing the auto confirming subscription.
2016-02-11 09:23:45 -08:00
Alex Clifford 706162fb3a Grammar inconsistencies 2016-02-11 10:06:43 +11:00
Veaceslav Mindru 1901533bea aws instance docs
associate_public_ip_address - missing explicit mentioning  that this is a bool.
2016-02-10 19:31:07 +01:00
Radek Simko d8de124c89 provider/aws: Document log file validation + KMS Key ID in CloudTrail 2016-02-08 11:53:40 +00:00
Cameron Stokes a239a2a125 Add docs for new aws_vpn_connection attributes. 2016-02-06 12:49:55 -08:00
Maxime Bury eaacf5c618 Add multi-region option to cloudtrail 2016-02-05 13:15:05 -05:00
Rich Burroughs cb537e9d7d fixed typo in AWS docs, export was misspelled 2016-02-04 15:43:42 -08:00
Mike Cowgill c7118eff24 updating launch_configuration aws documentation to include the placement_tenancy argument 2016-02-03 09:00:16 -08:00
stack72 e87d3bb711 Enabled Enhanced Monitoring for RDS 2016-02-03 00:14:24 +00:00
stack72 9407f538cf Changing the default for ship_final_snapshot on redshift_cluster to be true so as to match the code 2016-01-31 21:48:05 +00:00
Kevin Woods a994a9b72f updated referenced zone to use .zone_id vs .id 2016-01-29 11:03:02 -05:00
Clint b7582fa6d9 Merge pull request #4869 from hashicorp/b-aws-provider-auth-docs
provider/aws: Provide a better message if no AWS creds are found
2016-01-29 09:25:26 -06:00
clint shryock 70fae670b7 Update auth page for AWS 2016-01-29 09:09:24 -06:00
Clint dd0475ca4e Merge pull request #4879 from hashicorp/b-aws-vpc-classiclink-fix
providers/aws: Fix issue with VPC Classic Link and regions that don't support it
2016-01-28 10:54:40 -06:00
clint shryock 2ac040bef2 providers/aws: Fix issue with VPC Classic Link and regions that don't support it
- use eu-central-1 to a config to check for #4874
- update documentation
2016-01-28 10:12:06 -06:00
Paul Stack 05d19b0fc3 Merge pull request #4693 from stack72/f-aws-asg-schedule-0values
provider/aws: aws autoscale schedule 0 values
2016-01-28 15:38:41 +00:00
clint shryock 45c9a10d0f provider/aws: Provide a better message if no AWS creds are found 2016-01-27 16:30:03 -06:00
Paul Hinze c70eab6500 aws: undeprecate min_elb_capacity; restore min capacity waiting
It was a mistake to switched fully to `==` when activating waiting for
capacity on updates in #3947. Users that didn't set `min_elb_capacity ==
desired_capacity` and instead treated it as an actual "minimum" would
see timeouts for every create, since their target numbers would never be
reached exactly.

Here, we fix that regression by restoring the minimum waiting behavior
during creates.

In order to preserve all the stated behavior, I had to split out
different criteria for create and update, criteria which are now
exhaustively unit tested.

The set of fields that affect capacity waiting behavior has become a bit
of a mess. Next major release I'd like to rework all of these into a
more consistently named block of config. For now, just getting the
behavior correct and documented.

(Also removes all the fixed names from the ASG tests as I was hitting
collision issues running them over here.)

Fixes #4792
2016-01-27 13:30:44 -06:00
Csaba Palfi 8f6404a0e1 provider/aws enable specifying aws s3 redirect protocol
Signed-off-by: Csaba Palfi <csaba@palfi.me>
2016-01-21 23:26:13 +00:00
clint shryock 9ee6f822f6 provider/aws: Default Autoscaling Schedule min/max/desired to zero 2016-01-21 16:02:46 -06:00
Clint 569e74c2e7 Merge pull request #4481 from ElliotG/feature/encryptedBlockDevice
provider/aws: Added support for the encryption flag on ebs_block_devices in launch configurations
2016-01-19 10:26:11 -06:00
James Nugent 0a2966d26d Merge pull request #4730 from leeprovoost/master
provider/aws: Fix principal in cloud trail bucket policy docs
2016-01-19 07:45:37 -05:00
stack72 138a6b67a4 Change the AWS Launch Configuration Documentation examples from ami to image_id 2016-01-19 10:12:50 +00:00
Lee Provoost 96f3f76118 Principal * gets rejected by AWS, use cloudtrail.amazonaws.com instead. 2016-01-19 08:54:42 +00:00
Adam Ochonicki 46c2fd68d9 Fix typo in ecr_repository_policy docs 2016-01-18 21:40:08 -05:00
Srikalyan Swayampakula 9d125944c0 Added support for http/https endpoints that auto confirms SNS topic subscription.
http and https SNS topic subscription endpoints require confirmation to set a valid arn otherwise
arn would be set to "pending confirmation". If the endpoints auto confirm then arn is set
asynchronously but if we try to create another subscription with same parameters then api returns
"pending subscription" as arn but does not create another a duplicate subscription. In order to
solve this we should be fetching the subscription list for the topic and identify the subscription
with same parameters i.e., protocol, topic_arn, endpoint and extract the subscription arn.

Following changes were made to support the http/https endpoints that auto confirms

1. Added 3 extra parameters i.e.,
   1. endpoint_auto_confirms -> boolean indicates if end points auto confirms
   2. max_fetch_retries -> number of times to fetch subscription list for the topic to get the subscription arn
   3. fetch_retry_delay -> delay b/w fetch subscription list call as the confirmation is done asynchronously.

  With these parameters help added support http and https protocol based endpoints that auto confirm.

2. Update website doc appropriately
2016-01-17 12:24:32 -08:00
stack72 acabd4d407 Change ASG Lifecycle Default Result to be computed and added a test to record what the default value is 2016-01-15 22:34:16 +00:00
James Nugent 933de6b127 provider/aws: valid values for health check types
These are as per the AWS API documentation here:
http://docs.aws.amazon.com/Route53/latest/APIReference/API_CreateHealthCheck.html
2016-01-15 00:08:11 +00:00
James Nugent 51d09d8ebb Merge branch 'patch-1' of https://github.com/Phomias/terraform into Phomias-patch-1 2016-01-15 00:05:40 +00:00
Phomias 5ec817ba36 add port and type args aws_route53_health_check
Taking an educated guess at the valid values of the type argument based on what I read here: http://docs.aws.amazon.com/Route53/latest/DeveloperGuide/health-checks-creating.html

and fix a typo: s/respoonse/response/
2016-01-14 15:38:23 -06:00
Seth Vargo 8dbc43639d Use HTTPS + www. for links 2016-01-14 16:03:26 -05:00
Clint 8e6fba43ef Merge pull request #4564 from hashicorp/pr-3741
provider/aws: Supporting New AWS Route53 HealthCheck additions (supersedes #3741)
2016-01-14 14:41:19 -06:00
James Nugent ace215481a provider/aws: Add profile to provider config
This allows specification of the profile for the shared credentials
provider for AWS to be specified in Terraform configuration. This is
useful if defining providers with aliases, or if you don't want to set
environment variables. Example:

$ aws configure --profile this_is_dog
... enter keys

$ cat main.tf
provider "aws" {
    profile = "this_is_dog"

    # Optionally also specify the path to the credentials file
    shared_credentials_file = "/tmp/credentials"
}

This is equivalent to specifying AWS_PROFILE or
AWS_SHARED_CREDENTIALS_FILE in the environment.
2016-01-14 15:39:35 +00:00
clint shryock 8181a4ea24 minor clean ups after #3862 2016-01-13 16:58:07 -06:00
Clint 7f6624e926 Merge pull request #3862 from stack72/aws-redshift
provider/aws: AWS Redshift
2016-01-13 16:52:47 -06:00
Clint eed2a2a0f6 Merge pull request #3139 from koendc/b-rds-snapshots-required-fields
provider/aws: aws_db_instance: make some fields optional
2016-01-13 15:15:09 -06:00
Clint 921f6eb806 Merge pull request #4388 from jszwedko/add-support-for-aws-directory-service-microsoft-active-directory
Add support for creating Managed Microsoft Active Directory and Directory Connectors in AWS
2016-01-13 13:39:29 -06:00
Johannes Boyne df7ac2d51b Add AWS lambda alias support and documentation 2016-01-13 10:05:32 -06:00
Koen De Causmaecker 45ef11e59f provider/aws: aws_db_instance: unrequire fields
When spinning up from a snapshot or a read replica, these fields are
now optional:
* allocated_storage
* engine
* password
* username

Some validation logic is added to make these fields required when
starting a database from scratch.
The documentation is updated accordingly.
2016-01-13 15:40:15 +01:00
Clint 90e5f5f655 Merge pull request #3994 from Pryz/master
Add AWS Classiclink for AWS VPC resource
2016-01-12 16:48:23 -06:00
clint shryock ac60d6b959 provider/aws: Limit SNS Topic Subscription protocols
- update the ARN with the new ID
2016-01-12 09:57:09 -06:00
Nathaniel d6b9dc37e7 Update cloudwatch_metric_alarm.html.markdown
Added a link to the AWS docs for list of supported namespaces.
2016-01-11 13:54:41 -08:00
wata_mac bfcff6b068 Add az_mode and availability_zones parameters
Signed-off-by: wata727 <watassbass@gmail.com>
2016-01-11 23:45:07 +09:00
wata_mac df56ef44f7 Add availability_zone parameter.
Signed-off-by: wata727 <watassbass@gmail.com>
2016-01-11 23:33:21 +09:00
James Nugent 2cba2d3d04 provider/aws: Fix wording in S3 bucket docs 2016-01-09 10:09:23 -08:00
Kazunori Kojima f2ce28ed46 Add support for S3 logging. 2016-01-09 10:09:23 -08:00
William Holroyd 5371d41c16 Update codedeploy_deployment_group.html.markdown
Fixed markdown formatting for argument
2016-01-08 00:47:27 -05:00
stack72 3ebbb62bb0 Adding child_healthchecks to the Route 53 HealthCheck resource 2016-01-07 17:13:24 -06:00
stack72 172faca052 Adding support to Route53 HealthCheck for measure_latency and inverting healthcheck 2016-01-07 17:12:45 -06:00
James Nugent 9d9c97af66 Merge pull request #4543 from elblivion/aws-sns-doc-update
Update doc - missing lambda protocol
2016-01-07 11:46:14 -08:00
Anthony Stanton d450476d63 Update doc - missing lambda protocol
The last update missed listing `lambda` in the list of allowed protocols.
2016-01-07 16:17:52 +01:00
Paul Hinze 319f7d77a0 Merge pull request #3947 from hashicorp/phinze/asg-wait-on-update
provider/aws: wait for ASG capacity on update
2016-01-06 15:55:43 -06:00
Garrett Barboza 82d8e48a27 Add iam_server_certificate nuances to docs.
AWS does some funky stuff to handle all the variations in certificates that CA's like to hand out to users. This commit adds a note about this and details how to avoid issues. See #3837 for more information.
2016-01-04 21:07:52 -06:00
Clint 5551eaeddc Merge pull request #4463 from bsingr/patch-1
Remove recommendation to use create_before_destroy-hook in autoscaling group
2016-01-04 14:25:47 -06:00
James Nugent 940ed84685 Merge pull request #4492 from hashicorp/f-sns-display-name-docs
provider/aws: Document `display_name` on SNS Topic
2016-01-04 11:13:29 -05:00
Clint 25238ec7c5 Merge pull request #4427 from hashicorp/b-aws-r53-weights
provider/aws: Fix issue with Route53 and zero weighted records
2016-01-04 10:05:18 -06:00
James Nugent e22376f6a0 provider/aws: Document `display_name` on SNS Topic
Fixes #3799
2016-01-04 11:03:51 -05:00
clint shryock 4fc31abc6f fix typo 2016-01-04 09:59:21 -06:00
Elliot Graebert 2112f763ee Added support for the encryption flag on ebs_block_devices in launch configurations 2016-01-01 15:47:36 -08:00
James Nugent cd32f23476 Merge pull request #4465 from jedineeper/b-fix-aws-eip-docs
update docs to reflect that the allocation ID is exported as the attribute 'id'
2015-12-30 14:31:14 -05:00
Craig Marsden fc39334b52 update docs to reflect that the allocation ID is exported as the attribute 'id' 2015-12-30 17:50:22 +00:00
Jens Bissinger a018195645 Remove recommendation to use create_before_destroy-hook in autoscaling group
Only use the create_before_destroy-hook in launch configurations. The autoscaling group must not use the create_before_destroy-hook, because it can be updated (and not destroyed + re-created). Using the create_before_destroy-hook in autoscaling group also leads to unwanted cyclic dependencies.
2015-12-30 10:46:32 +01:00
kozo yamagata 2a3c80461f Fix typo 'auto' => 'allow' 2015-12-30 16:58:23 +09:00
stack72 59bfa636c0 Adding a link to the runtime options for the AWS Lambda functions 2015-12-27 21:38:45 +00:00
clint shryock 787340f801 make note of -1 value for r53 record 2015-12-22 16:47:57 -06:00