Commit Graph

18211 Commits

Author SHA1 Message Date
Clint 640530e76f Update CHANGELOG.md 2016-12-09 11:52:00 -06:00
Clint e705cd9a93 Merge pull request #10635 from dougneal/import_vpc_peerconn_accepter_fix
provider/aws: aws_vpc_peering_connection: import fix
2016-12-09 11:50:55 -06:00
Mitchell Hashimoto 148b8a12ea
website: remove BC from upgrade guide 2016-12-09 12:42:18 -05:00
Mitchell Hashimoto cd1cd1cb7d
vendor: update HIL 2016-12-09 12:40:34 -05:00
Mitchell Hashimoto b5f1738e17
config: allow IDs to start with numbers 2016-12-09 12:35:23 -05:00
Mitchell Hashimoto 7f87a0109b
command/plan: user friendly error if plan file given to plan command 2016-12-09 11:34:38 -05:00
Paul Stack 15814c3ecc Update CHANGELOG.md 2016-12-09 15:51:38 +00:00
Tom Wilkie dd39296d6c Allow import of aws_security_groups with more than one source_security_group_id rule (#9477)
* Allow import of aws_security_groups with more than one source_security_group_id rule

* Add acceptable test for security group with multiple source rules.
2016-12-09 15:50:51 +00:00
Clint e902ff320c Update CHANGELOG.md 2016-12-09 08:44:21 -06:00
Clint 5f765d9de6 Merge pull request #10624 from hashicorp/pr-9891
provider/aws: Add aws_snapshot_create_volume_permission resource (contd. #9891)
2016-12-09 08:43:18 -06:00
clint shryock c54dba65b0 document snapshot_create_volume_permissions 2016-12-09 08:36:40 -06:00
Clint e2fc12c38f Update CHANGELOG.md 2016-12-09 08:29:12 -06:00
Clint 0766074289 Merge pull request #10583 from hashicorp/f-lightsail-key-pair
provider/aws: Add Lightsail Key Pair resource
2016-12-09 08:26:00 -06:00
Doug Neal 24baa38408 provider/aws: aws_vpc_peering_connection: import fix
When importing an `aws_vpc_peering_connection`, the code assumes that
the account under Terraform control is the initiator (requester) of the
VPC peering request. This holds true when the peering connection is
between two VPCs in the same account, or when the peering connection has
been initiated from the controlled account to another.

However, when the peering connection has been initiated from a foreign
account towards the account under management, importing the peering
connection into the statefile results in values of `peer_vpc_id` and
`vpc_id` being the opposite way round to what they should be, and in the
`peer_owner_id` being set to the managed account's ID rather than the
foreign account's ID.

This patch checks the Accepter and Requester Owner IDs against the AWS
connection's reported owner ID, and reverses the mapping if it is
determined that the VPC peering connection is owned by the foreign
account.
2016-12-09 12:05:06 +00:00
Paul Stack 510c82c6d7 Update CHANGELOG.md 2016-12-09 09:42:54 +00:00
Peter McAtominey 6f21b78710 provider/azurerm: fix virtual_machine reading plan as the wrong type (#10626)
TF_ACC=1 go test ./builtin/providers/azurerm -v -run TestAccAzureRMVirtualMachine_plan -timeout 120m
=== RUN   TestAccAzureRMVirtualMachine_plan
--- PASS: TestAccAzureRMVirtualMachine_plan (798.75s)
PASS
ok  	github.com/hashicorp/terraform/builtin/providers/azurerm	798.835s
2016-12-09 10:41:45 +01:00
Paul Stack 6f2f92fc35 Update CHANGELOG.md 2016-12-09 09:35:48 +00:00
Eddy Hernandez 7e737dac62 Add support for AWS CA Central 1 Region (#10618)
* Add support for AWS CA Central 1 Region

* additional metadata for ca-central-1

* add elb metadata for ca-central-1
2016-12-09 10:35:07 +01:00
Mitchell Hashimoto 92faace610 release: clean up after v0.8.0-rc3 2016-12-09 05:07:23 +00:00
Mitchell Hashimoto fce2be1773
v0.8.0-rc3 2016-12-09 05:01:06 +00:00
Mitchell Hashimoto b874d55f36
v0.8.0-rc3 2016-12-09 04:55:56 +00:00
Mitchell Hashimoto 73cb292b6a
update CHANGELOG 2016-12-08 23:19:42 -05:00
Mitchell Hashimoto 124fbc10a6 Merge pull request #10628 from hashicorp/b-identifier
config: disallow names starting with ints
2016-12-08 23:18:55 -05:00
Mitchell Hashimoto 8b9e2c17cc
config: fix NameRegexp validation to allow single-char names 2016-12-08 23:13:19 -05:00
Mitchell Hashimoto ef2500932d
website: update upgrade guide for number backwards incompat 2016-12-08 23:09:18 -05:00
Mitchell Hashimoto 6b458160b9
config: disallow names starting with ints
Fixes #10597

This disallows any names for variables, modules, etc. starting with
ints. This causes parse errors with the new HIL parser and actually
causes long term ambiguities if we allow this.

I've also updated the upgrade guide to note this as a backwards
compatibility and how people can fix this going forward.
2016-12-08 23:01:51 -05:00
Dana Hoffman 2ad3042877 fix tests 2016-12-08 19:59:03 -08:00
Dana Hoffman 73177e8127 Update docs 2016-12-08 18:05:48 -08:00
clint shryock 42057045ff refactor the test to use caller_identity data source, and new ebs_snapshot resource 2016-12-08 16:43:03 -06:00
Jeremy Asher 185ee439da add wait after AWS snapshot attr modification
This adds up to a 5 minute wait after issuing an add or remove request
to adjust a snapshot's createVolumePermission attribute.
2016-12-08 16:12:25 -06:00
Jeremy Asher f20d1c3caa WIP aws_snapshot_create_volume_permission tests 2016-12-08 16:12:24 -06:00
Jeremy Asher 7216185f0d implement aws_snapshot_create_volume_permission
This adds the new resource aws_snapshot_create_volume_permission which
manages the createVolumePermission attribute of snapshots.  This allows
granting an AWS account permissions to create a volume from a particular
snapshot.  This is often required to allow another account to copy a
private AMI.
2016-12-08 16:12:23 -06:00
Dana Hoffman 985b4e2b66 use conflictswith for health check instead of separate type field 2016-12-08 13:35:57 -08:00
clint shryock 97ac4bde16 implement name_prefix 2016-12-08 14:08:45 -06:00
Dana Hoffman 2960856105 add links to docs on region backend service 2016-12-08 11:04:01 -08:00
Dana Hoffman 35664ff0e1 log id of health check that still exists on destroy 2016-12-08 10:40:09 -08:00
Mitchell Hashimoto 12f4b5ecb8 Update CHANGELOG.md 2016-12-08 12:31:31 -05:00
Mitchell Hashimoto 6d4f63c7b2 Merge pull request #10615 from hashicorp/b-aws-encrypt-access-key-secrets
provider/aws: Encrypt aws_iam_access_key.secret with pgp
2016-12-08 12:30:44 -05:00
Mitchell Hashimoto c002de9cf9 Merge pull request #10616 from hashicorp/b-catch-sigterm
Forward SIGTERM and handle that as an interrupt
2016-12-08 12:22:37 -05:00
Mitchell Hashimoto e9c35eae32
Forward SIGTERM and handle that as an interrupt 2016-12-08 12:20:25 -05:00
clint shryock 1e8e83fa6a provider/aws: Encrypt aws_iam_access_key.secret with pgp
optionally encrypt the iam access key secret with a pgp key
2016-12-08 11:08:05 -06:00
Paul Stack 9c80c82d9e Update CHANGELOG.md 2016-12-08 17:07:32 +01:00
Peter McAtominey 56344eb98d provider/azurerm: fix servicebus_topic max_size_in_megabytes for premium namespaces (#10611)
The value is only multiplied by the API for topics in non-premium namespaces

TF_ACC=1 go test ./builtin/providers/azurerm -v -run TestAccAzureRMServiceBusTopic_enablePartitioning -timeout 120m
=== RUN   TestAccAzureRMServiceBusTopic_enablePartitioningStandard
--- PASS: TestAccAzureRMServiceBusTopic_enablePartitioningStandard (378.80s)
=== RUN   TestAccAzureRMServiceBusTopic_enablePartitioningPremium
--- PASS: TestAccAzureRMServiceBusTopic_enablePartitioningPremium (655.00s)
PASS
ok  	github.com/hashicorp/terraform/builtin/providers/azurerm	1033.874s
2016-12-08 17:06:27 +01:00
Doug Neal 195b041cd5 Validate `effect` in aws_iam_policy_document data source (#10608)
AWS allows only the case-sensitive strings `Allow` and `Deny` to appear
in the `Effect` fields of IAM policy documents. Catch deviations from
this, including mis-casing, before hitting the API and generating an
error (the error is a generic 400 and doesn't indicate what part of the
policy doc is invalid).
2016-12-08 16:16:40 +01:00
stack72 9801c65c9e
Merge branch 'manojlds-patch-2' 2016-12-08 12:54:13 +01:00
stack72 32b81ab209
docs: Update getting-started guide to suggest remote-state 2016-12-08 12:53:34 +01:00
stack72 ff8c948cf5
Merge branch 'patch-2' of https://github.com/manojlds/terraform into manojlds-patch-2 2016-12-08 12:49:03 +01:00
Paul Stack 0244b8b110 Update CHANGELOG.md 2016-12-08 12:07:57 +01:00
Ninir 7f69f37318 provider/aws: Improvde the Cloudfront documentation when using s3 origins (#10087) 2016-12-08 12:01:18 +01:00
Paul Stack b03af1416e Update CHANGELOG.md 2016-12-08 11:59:41 +01:00