Commit Graph

370 Commits

Author SHA1 Message Date
Jack Pearkes b71ff28871 providers/mailgun: smtp_password is required 2014-08-25 10:09:50 -07:00
Jack Pearkes e3d54cb487 providers/mailgun: initial commit 2014-08-25 10:09:50 -07:00
bdd b2ff49be2e More descriptive variable names for pipes. 2014-08-25 12:39:07 -04:00
bdd 6da9a2d49d Use scanner instead of buffer read line
Supported in Go 1.1 http://golang.org/pkg/bufio/#Scanner
2014-08-25 11:58:14 -04:00
Mitchell Hashimoto 56cf1e6faa Fix go vet complaints 2014-08-24 21:50:35 -07:00
Ryan Uber e530eea226 provider/aws: fix panic when user_data receives nil from StateFunc 2014-08-23 00:20:41 -07:00
Mitchell Hashimoto 623c635fb1 providers/aws: can create records with multiple values [GH-221] 2014-08-22 17:19:39 -07:00
Mitchell Hashimoto c886148e15 providers/aws: use example.com for tests 2014-08-22 12:51:19 -07:00
Mitchell Hashimoto ed99d2497b providers/aws: retry route53 operations [GH-183] 2014-08-22 12:51:11 -07:00
Mitchell Hashimoto 8f70920c17 providers/aws: fix some other issues with aws_instance 2014-08-22 12:20:06 -07:00
Mitchell Hashimoto ba68be5672 providers/aws: use StateFunc to process the user_data 2014-08-22 08:46:48 -07:00
Mitchell Hashimoto f26a2700a1 fmt 2014-08-22 08:46:03 -07:00
Mitchell Hashimoto 7be2f1b091 helper/schema: add GetOk 2014-08-21 23:03:04 -07:00
Mitchell Hashimoto 2fd2470c92 providers/aws: resource_aws_instance partially to schema.Resource 2014-08-21 18:38:43 -07:00
Alek Storm b6c5e5bbf6 Allow aws_instance private IP's to be specified 2014-08-21 17:13:36 -07:00
Mitchell Hashimoto cdc2a53553 providers/aws: changing order of security group cidrs doesn't affect
things
2014-08-21 14:10:09 -07:00
Mitchell Hashimoto 5b620b76f5 providers/aws: update comment 2014-08-21 12:00:32 -07:00
Mitchell Hashimoto 200f7c4488 providers/aws: can add remove individual cidr/groups in security group 2014-08-21 11:59:03 -07:00
Mitchell Hashimoto 4015d942ab providers/aws: security group ingress rules treated as set [GH-87]
/cc @pearkes - !!!
2014-08-20 22:24:13 -07:00
Jack Pearkes 6eb6d19384 providers/aws: vpc dns settings tests
cc/ @deoxxa see diff for how to add tests – quite straight forward.

Normally, I would like to add a check to ensure that the attribute
was updated remotely (by seeing what it's value with AWS is) but
I don't think we have that value returned.
2014-08-20 11:29:52 -07:00
Mitchell Hashimoto 53cdbcc9fa providers/aws: security group ingress rules can be updated 2014-08-20 11:18:16 -07:00
Mitchell Hashimoto a594ef9a28 providers/aws: expandIPPerms works again 2014-08-20 11:18:16 -07:00
Jack Pearkes 33a7d32f40 Merge pull request #172 from deoxxa/add-vpc-dns-attributes
add vpc dns attribute support
2014-08-20 11:14:07 -07:00
Jack Pearkes 97cae408b2 providers/aws: tests and document adding load balancers to autoscaling
cc/ @thatha
2014-08-20 10:42:14 -07:00
Mitchell Hashimoto 89041c0595 providers/aws: resource_aws_security_group using helper/schema 2014-08-20 10:40:18 -07:00
Ian Atha 13b0e7ee2c Allow 'load_balancers.*' to pass resource_aws_autoscaling_group_validation 2014-08-19 19:53:12 -07:00
Mitchell Hashimoto d25747ba5c providers/aws: cleaner detection of VPC [GH-122] 2014-08-19 17:22:25 -07:00
Mitchell Hashimoto c4d261ac61 providers/aws: resource_aws_eip is in new framework 2014-08-19 16:56:23 -07:00
Mitchell Hashimoto 776bb22e4e providers/aws: create an empty schema.Provider 2014-08-19 15:40:48 -07:00
Mitchell Hashimoto 25607686c1 provider/heroku: fix bin 2014-08-19 10:19:19 -07:00
Mitchell Hashimoto 9a0c0ea985 providers/heroku: domain/drain have dep on app 2014-08-19 10:16:47 -07:00
Mitchell Hashimoto 2a6b83591a providers/heroku: nuking config vars works 2014-08-19 10:13:34 -07:00
Jack Pearkes d99e475ea2 Merge pull request #170 from alekstorm/aws-security-group-owner
Implement specification of AWS security groups in ingress rules as <owner>/<id>
2014-08-19 09:42:05 -07:00
Mitchell Hashimoto 839f9d84c8 Merge pull request #201 from hashicorp/f-resource
High-Level Framework for Writing Providers and Resources
2014-08-19 09:40:59 -07:00
Jack Pearkes 4cdb95a6b2 Merge pull request #166 from alekstorm/aws-elb-subnets-security-groups
Add 'security_groups' and 'subnets' args to 'aws_elb'
2014-08-19 09:40:30 -07:00
Mitchell Hashimoto e6dff7bf04 provider/heroku: update bin to use the new provider 2014-08-19 09:38:58 -07:00
Mitchell Hashimoto e2b8951a58 remove heroku2 since we're done here 2014-08-19 09:19:51 -07:00
Mitchell Hashimoto 43405c270b providers/heroku: heroku_drain 2014-08-19 09:18:45 -07:00
Mitchell Hashimoto 27ee254447 providers/heroku: heroku_domain resource 2014-08-19 09:14:14 -07:00
Mitchell Hashimoto 5fc308d934 providers/heroku: addon 2014-08-18 15:49:54 -07:00
Mitchell Hashimoto 4e1d8869fe providers/heroku: use new schema API 2014-08-18 15:18:51 -07:00
Mitchell Hashimoto 199b72d798 providers/heroku: clean up unused functions 2014-08-18 09:36:37 -07:00
Mitchell Hashimoto 513596cc37 providers/heroku: Heroku app is mostly converted 2014-08-18 09:32:40 -07:00
Mitchell Hashimoto b3f4a9eb10 providers/heroku2: going to convert this to new schema package 2014-08-17 20:58:41 -07:00
Mitchell Hashimoto ca5be43519 providers/aws: fix RDB test syntax error 2014-08-11 09:58:53 -07:00
deoxxa 4405a8d974 add vpc dns attribute support 2014-08-09 22:43:00 +10:00
Alek Storm 7109b8c770 Implement specification of AWS security groups in ingress rules as <owner>/<id> 2014-08-08 11:51:18 -07:00
Alek Storm 5a84296c61 Add 'security_groups' and 'subnets' args to 'aws_elb' 2014-08-07 17:41:15 -07:00
Alex Gaynor 46154ca1d3 Fixed a ton of typos in docs and comments 2014-08-07 00:19:56 -07:00
Hector Castro f869a077a2 Fix output of aws_db_instance port via endpoint
When trying to output the `endpoint` attribute of an `aws_db_instance`,
the port was not being emitted properly. Converting the port number from
an integer to a string has resolved the issue.
2014-08-01 17:13:26 -04:00
Jack Pearkes 61122beec4 providers/digitalocean: fix comment 2014-08-01 11:05:32 -04:00
Jack Pearkes d9bfe1c2fe providers/digitalocean: only save private ip address if private 2014-08-01 10:12:29 -04:00
Jack Pearkes 2fe6f2e2b1 providers/digitalocean: restart droplet in failed resize 2014-08-01 10:10:52 -04:00
Jack Pearkes c6741cf1b5 providers/aws: add tests for instance availability zone
cc/ @dcosson here we go!
2014-07-31 20:35:31 -04:00
Jack Pearkes aa94e0c41a Merge pull request #129 from dcosson/aws_availability_zone
Allow specifying the AWS availability zone on creation
2014-07-31 15:28:34 -04:00
Jack Pearkes e07dc8891d providers/aws: db instance wait for destroy, allow destroy config 2014-07-31 15:22:14 -04:00
Danny Cosson e838624468 Allow specifying the AWS availability zone on creation 2014-07-31 13:52:03 -04:00
Jack Pearkes 887ee10f77 providers/cloudflare: add bins
close #126
2014-07-31 09:52:48 -04:00
Jack Pearkes 0ca0b8dd62 providers/aws: remove password from resource diff to not trigger changes
cc/ @mitchellh

This one caught me a bit, and I'm not sure if there's another AttrType
that could be useful here – perhaps a AttrTypeHidden or something? I
don't know...this feels sloppy to have in the diff func.
2014-07-31 09:39:19 -04:00
Jack Pearkes 9a2685cf13 providers/aws: db instances now depend on db security groups 2014-07-31 09:28:25 -04:00
Jack Pearkes bc79f15db3 providers/aws: require description in security groups. fixes #123 2014-07-30 17:15:51 -04:00
Jack Pearkes 60ed50b4b6 providers/aws: allow "modifying" as pending state for db instances
fixes #119
2014-07-30 11:58:11 -04:00
John Wards 7493ee31cb Stop passing engine into EngineVersion
Fixes #95
2014-07-30 16:44:02 +01:00
Jack Pearkes 7adc6162d8 providers/aws: add test for health check, save health check state
cc/ @vertis

I added an acceptance test here, as well as making it so we
saved the health check state on update_state.
2014-07-30 10:15:22 -04:00
Luke Chadwick 0eed0908df Add health_check to aws_elb resource 2014-07-30 21:46:51 +10:00
Jack Pearkes 14b80abc29 providers/heroku: fix drain test
cc/ @bmarini

Basically, the attr check we have in our tests is looking at resources
that we specify. It's basically check that "if I send this, I get this"
from the external resource.

In this case, we don't know what the token will be, so we can't
do it that way. I replaced it with a "make sure this is more than an
empty string" assertion.
2014-07-29 19:16:01 -04:00
Jack Pearkes d3e8454ceb Merge pull request #97 from bmarini/add-heroku-drain-resource
Add heroku drain resource
2014-07-29 19:15:17 -04:00
Jack Pearkes af62002c1b go fmt 2014-07-29 19:09:55 -04:00
Jack Pearkes 77697b9936 providers/aws: add failing test for aws region validation
cc/ @jorgeng87
2014-07-29 19:09:17 -04:00
Jack Pearkes 872acb3740 providers/digitalocean: fix ip address when using private networking
This adds a new `ipv4_address_private` and `ipv4_address_public`
computed attr. Also pulls in upstream changes from pearkes/digitalocean
2014-07-29 19:04:10 -04:00
Ben Marini 6dd629a334 Add heroku drain resource 2014-07-29 15:45:12 -07:00
Jorge Núñez aad0fec940 Update test with valid AWS region 2014-07-30 00:22:50 +02:00
Jorge Núñez 5900b3f1c0 Add AWS region validation 2014-07-30 00:22:37 +02:00
Luke Chadwick 15bdf8b5f9 Add user_data to aws_launch_configuration 2014-07-30 07:30:24 +10:00
Jack Pearkes cbcb559c0c providers/aws: add failing test for reorder ingress rules bug 2014-07-29 15:03:51 -04:00
Jack Pearkes 6653542466 providers/aws: fix order of ingress rules on security group 2014-07-29 12:45:57 -04:00
Jack Pearkes dbe6b74884 providers/aws: depend on security groups, failing test for #87 2014-07-29 12:15:42 -04:00
Jack Pearkes d47e3f76ea providers/aws: fix spelling of desired_capacity
see #78
2014-07-29 10:43:18 -04:00
Jack Pearkes 4f2026f6c6 providers/aws: only flatten cidr if they exist
fixes #87
2014-07-29 10:29:48 -04:00
Jack Pearkes 86c7aeb8a6 providers/aws: use merged reosource state for associate_public_ip
cc/ @vertis
2014-07-29 10:23:48 -04:00
Jack Pearkes fa13a12a6e Merge pull request #85 from vertis/aws_associate_public_ip_address
Add associate_public_ip_address as an attribute on the aws_instance resource
2014-07-29 10:15:32 -04:00
Jack Pearkes da4ddef136 providers/aws: fix assertion of non-required cidr blocks in sec groups
fixes #65, #86
2014-07-29 10:05:32 -04:00
Luke Chadwick 974074fee9 Add associate_public_ip_address as an attribute of the aws_instance resource 2014-07-29 22:06:53 +10:00
Armon Dadgar be1ae66d86 provider/aws: fixing tests 2014-07-28 13:27:55 -04:00
Armon Dadgar 8c69536b3b provider/aws: fixing security groups test 2014-07-28 13:14:24 -04:00
Jack Pearkes f6fa012e82 providers/aws: remove security_group_update 2014-07-28 13:13:29 -04:00
Armon Dadgar 0b4950976c Revert "providers/digitalocean: don't save status and locked"
This reverts commit b9414b832c.
2014-07-28 13:04:17 -04:00
Armon Dadgar bf3ac46c36 provider/digitalocean: less aggressive retry 2014-07-28 12:58:19 -04:00
Armon Dadgar c2677b3c0a provider/aws: More strict check 2014-07-28 12:50:19 -04:00
Armon Dadgar c8d5ea4d9d provider/aws: fixing instance for EC2-VPC /cc:@pearkes 2014-07-28 12:47:40 -04:00
Armon Dadgar bc64366a92 provider/aws: Less aggressive API rate 2014-07-28 12:10:35 -04:00
Armon Dadgar ebd50ab6ff provider/aws: Fixing EIP in EC2-VPC 2014-07-28 12:05:00 -04:00
Armon Dadgar c3b0417678 provider/aws: Fixing tests 2014-07-28 11:27:58 -04:00
Armon Dadgar e596feb42b provider/aws: Fixing launch config depdency 2014-07-28 11:27:58 -04:00
Jack Pearkes 7ef47671b0 providers/aws: only security group and instances if we have them 2014-07-27 21:20:03 -04:00
Armon Dadgar da539caf0a provider/consul: Acceptance test uses demo.consul.io 2014-07-26 21:25:28 -04:00
Armon Dadgar 2263616c2e provider/consul: Fixing resource updates 2014-07-26 21:24:20 -04:00
Armon Dadgar 18333f149e provider/aws: route53 zone detects deletion 2014-07-26 21:24:20 -04:00
Armon Dadgar dc0de63a72 provider/consul: cleanup 2014-07-26 20:21:48 -04:00
Mitchell Hashimoto b1fc87fe59 providers/aws/aws_eip: support update (reassociation)
/cc @pearkes - woot
2014-07-26 15:53:26 -07:00