clint shryock
7462eb1742
provider/aws: Fix issue with detecting drift in AWS Security Groups in-line rules
2016-01-21 11:21:25 -06:00
James Nugent
8e538b68ec
Fix errors with gofmt compliance
2015-12-17 12:35:19 -05:00
stack72
6817e0d144
Adding the ability to generate a securitygroup name-prefix
2015-12-04 09:21:08 -05:00
Clint Shryock
0c2f189d08
provider/aws: Update to aws-sdk 0.9.0 rc1
2015-08-17 13:27:16 -05:00
Clint Shryock
579ccbefea
provider/aws: Update source to comply with upstream breaking change
2015-07-28 15:29:46 -05:00
Paul Hinze
66c51d44f6
aws/provider convert _normal tests to _basic
...
For consistency!
2015-06-07 18:04:38 -05:00
Paul Hinze
b71fa3d0ae
provider/aws: handle upstream aws-sdk-go repo move
...
`awslabs/aws-sdk-go => aws/aws-sdk-go`
Congrats to upstream on the promotion. :)
2015-06-03 13:36:57 -05:00
Paul Hinze
31258e06c6
provider/aws: fix breakages from awserr refactor
...
This landed in aws-sdk-go yesterday, breaking the AWS provider in many places:
3c259c9586
Here, with much sedding, grepping, and manual massaging, we attempt to
catch Terraform up to the new `awserr.Error` interface world.
2015-05-20 06:21:23 -05:00
Clint Shryock
f7b6b6b2b5
Strip 'sdk' suffix from methods; it's a remnant
2015-05-12 14:58:10 -05:00
Clint Shryock
70984526a4
Merge remote-tracking branch 'ctiwald/ct/fix-protocol-problem'
...
* ctiwald/ct/fix-protocol-problem:
aws: Document the odd protocol = "-1" behavior in security groups.
aws: Fixup structure_test to handle new expandIPPerms behavior.
aws: Add security group acceptance tests for protocol -1 fixes.
aws: error on expndIPPerms(...) if our ports and protocol conflict.
2015-05-07 17:13:21 -05:00
Clint Shryock
885efa0837
provider/aws: Add Security Group Rule as a top level resource
...
- document conflict with sg rules and sg in-line rules
- for this to work, ingress rules need to be computed
2015-05-05 16:56:39 -05:00
Clint Shryock
85b1756c27
revise tests and check for vpc_id
2015-05-05 16:23:26 -05:00
Clint Shryock
ee65684abe
Add spec for removing default egress rule
2015-05-05 16:23:26 -05:00
Christopher Tiwald
362a6124e3
aws: Add security group acceptance tests for protocol -1 fixes.
...
These only test ingress rules as egress rules are broken by the
default "0.0.0.0/0" rule Amazon includes with every egressed security
group.
2015-05-04 23:55:32 -04:00
Paul Hinze
079856620a
provider/aws: set default SG description
...
because requiring a SG description is annoying
2015-04-22 13:27:20 -05:00
Paul Hinze
33de319293
provider/aws: allow SG names to be generated
2015-04-22 12:56:06 -05:00
Clint Shryock
ba43b7c963
mass search-replace of ec2SDKconn
2015-04-16 15:05:55 -05:00
Clint Shryock
ffdd20133a
providers/aws: Convert AWS Security Group to upstream aws-sdk-go
...
Moves structure test lib too, to that `make test` actually runs it
2015-04-09 09:10:04 -05:00
Clint Shryock
87e1260fac
update hash for aws security group test
2015-04-02 09:00:47 -05:00
Clint Shryock
755f8d0f44
provider/aws: Fix acceptance test checks for AWS Security Group
2015-03-30 14:54:03 -05:00
Clint Shryock
28fbd971fc
Retire goamz
2015-03-13 09:42:50 -05:00
Clint Shryock
57556bba75
Replace tags files with tags_sdk, rename, and update
2015-03-12 16:43:08 -05:00
Clint Shryock
3977256c17
Cleansup: Restore expandIPPerms, remove flattenIPPerms
2015-03-10 16:35:49 -05:00
Clint Shryock
20b02cacd4
provider/aws: Convert AWS Security Group to aws-sdk-go
...
Convert security group test too
2015-03-09 11:45:58 -05:00
nevins-b
47b244d296
adding support for egress rules in AWS Security Groups
2015-01-23 09:46:20 -05:00
Sander van Harmelen
83c760fcb3
core: refactoring the way sets work internally v2
...
This is a refactored solution for PR #616 . Functionally this is still
the same change, but it’s implemented a lot cleaner with less code and
less changes to existing parts of TF.
2014-12-12 23:21:20 +01:00
Sander van Harmelen
eccd5ad308
Refactored about 90%
...
Still need to update 2 resources and check the acceptance tests, but
overall we’re nearly there 😃
2014-11-21 17:58:34 +01:00
Long Nguyen
eef3197ba0
Added security group tagging
2014-10-14 17:11:09 -04:00
Mitchell Hashimoto
dbc890e401
providers/aws: add `self` to ingress [GH-219]
2014-09-30 14:19:16 -07:00
Mitchell Hashimoto
c5d6df692d
providers/aws: tests passing, compiles
2014-09-16 17:49:24 -07:00
Mitchell Hashimoto
56cf1e6faa
Fix go vet complaints
2014-08-24 21:50:35 -07:00
Mitchell Hashimoto
200f7c4488
providers/aws: can add remove individual cidr/groups in security group
2014-08-21 11:59:03 -07:00
Mitchell Hashimoto
53cdbcc9fa
providers/aws: security group ingress rules can be updated
2014-08-20 11:18:16 -07:00
Jack Pearkes
cbcb559c0c
providers/aws: add failing test for reorder ingress rules bug
2014-07-29 15:03:51 -04:00
Jack Pearkes
6653542466
providers/aws: fix order of ingress rules on security group
2014-07-29 12:45:57 -04:00
Jack Pearkes
dbe6b74884
providers/aws: depend on security groups, failing test for #87
2014-07-29 12:15:42 -04:00
Armon Dadgar
8c69536b3b
provider/aws: fixing security groups test
2014-07-28 13:14:24 -04:00
Mitchell Hashimoto
388bcfa7b4
providers/aws: VPC assignment fix, and dependencies for destroy
2014-07-17 10:03:15 -07:00
Mitchell Hashimoto
082790c4c1
providers/aws: basic user data, doesn't fully work yet because diffs are broke
2014-07-16 09:01:56 -07:00
Jack Pearkes
eafbc8d8c6
providers/aws: improve security group acc tests
2014-07-16 11:14:23 -04:00
Jack Pearkes
0252b5e3e5
providers/aws: fix tests for aws_security_group
2014-07-16 10:50:52 -04:00
Jack Pearkes
e992d62717
providers/aws: use precheck for security group
2014-07-10 16:43:03 -04:00
Jack Pearkes
2e767da3df
providers/aws: security group acceptance tests
2014-07-10 16:40:14 -04:00