clint shryock
45c9a10d0f
provider/aws: Provide a better message if no AWS creds are found
2016-01-27 16:30:03 -06:00
James Nugent
ace215481a
provider/aws: Add profile to provider config
...
This allows specification of the profile for the shared credentials
provider for AWS to be specified in Terraform configuration. This is
useful if defining providers with aliases, or if you don't want to set
environment variables. Example:
$ aws configure --profile this_is_dog
... enter keys
$ cat main.tf
provider "aws" {
profile = "this_is_dog"
# Optionally also specify the path to the credentials file
shared_credentials_file = "/tmp/credentials"
}
This is equivalent to specifying AWS_PROFILE or
AWS_SHARED_CREDENTIALS_FILE in the environment.
2016-01-14 15:39:35 +00:00
Clint
7f6624e926
Merge pull request #3862 from stack72/aws-redshift
...
provider/aws: AWS Redshift
2016-01-13 16:52:47 -06:00
Mark Troyer
b396bbb3e4
provider/aws: Allow ap-northeast-2 (Seoul) as valid region
2016-01-11 13:46:53 -08:00
nextrevision
6a3ed429ad
Adding AWS ECR provider resources
...
Adds ECR aws_ecr_repository and aws_ecr_repository_policy resources to
the AWS provider.
2015-12-22 10:31:30 -05:00
stack72
85afc7d614
Initial creation of the work for AWS RedShift Support
...
Finalising the schema and acceptance tests for the Redshift Security Group's
2015-12-20 20:19:55 +00:00
clint shryock
adf417809a
add some comments on auth refactoring
2015-12-15 10:49:23 -06:00
clint shryock
5f5459a1fb
provider/aws: Refactor AWS Authentication chain
...
- update auth checking to check metadata header
- refactor tests to not export os env vars
2015-12-15 10:46:10 -06:00
stack72
d14d891367
Finishing the first pass at Kinesis Firehose. I have only implemented the S3 configuration right now as Terraform doesn't include RedShift support
2015-11-10 16:24:33 +00:00
stack72
fc983c5505
Initial Create, Read and Delete work for the S3 part of the Kinesis Firehose resource
2015-11-09 22:26:55 +00:00
stack72
63d7f5993d
Changing the AWS CodeCommit Connection Initiation to use the new session based work
2015-10-30 22:23:28 +00:00
stack72
89ce6f7c83
Started the work for the AWS CodeCommit Repository resource
...
Starting to add the skeleton for the creation and update of a repository
2015-10-30 21:39:04 +00:00
Paul Hinze
cadbbbae08
aws: fix build after upstream breaking change
...
see
1a69d06935
2015-10-29 18:52:10 -05:00
Clint
cb2ecf5733
Merge pull request #3255 from Runscope/local-kinesis
...
provider/aws: allow local kinesis
2015-10-29 08:24:07 -05:00
Radek Simko
a618b048cf
aws: Add support for aws_cloudtrail
2015-10-28 17:13:14 +00:00
Radek Simko
0d8d6fde79
Merge pull request #2636 from TimeIncOSS/f-aws-cloudformation
...
provider/aws: Add aws_cloudformation_stack
2015-10-28 16:16:14 +00:00
Jeff Mitchell
1373a6086b
Use cleanhttp for new http clients
2015-10-22 14:23:59 -04:00
Christopher Tiwald
e59fb4e6ca
aws: Add support for "aws_codedeploy_app" resources.
2015-10-20 18:05:39 -04:00
Jeff Mitchell
b0ceffc322
Remove usage from dependencies as well. Other dependencies need upstream merging to completely solve this.
2015-10-19 12:06:34 -04:00
Garrett Heel
9c2725e0a5
provider/aws: allow local kinesis
2015-10-13 14:29:50 -07:00
Radek Simko
4dfbbe3074
provider/aws: Add implementation for aws_cloudformation_stack
2015-10-13 22:55:55 +02:00
stack72
5266db31e2
Adding the ability to manage a glacier vault
2015-10-13 14:58:29 +01:00
Radek Simko
a66ac7e751
provider/aws: Add aws_directory_service_directory resource
2015-10-08 17:06:39 -07:00
Radek Simko
2b9f4f895e
provider/aws: Add support for aws_elasticsearch_domain
2015-10-07 16:57:46 -07:00
Radek Simko
f9efede852
gofmt files from recently merged PRs
2015-10-07 13:35:06 -07:00
Paul Hinze
7905b91b8a
Merge pull request #3313 from sarguru/iam_validateaccount_fixcrash
...
Fix ValidateAccountId for IAM Instance Profiles
2015-10-07 12:18:38 -05:00
Martin Atkins
8e79f0cb3a
Prepare for adding OpsWorks resources.
...
Here we add an OpsWorks client instance to the central client bundle and
establish a new documentation section, both of which will be fleshed out in
subsequent commits that add some OpsWorks resources.
2015-10-05 22:47:44 -07:00
Martin Atkins
5c30573a63
AWS config forced to us-east-1 in variable, not inline.
...
There are several AWS services that are global in scope and thus need to
be accessed via the us-east-1 endpoints, so we'll make the us-east-1
variant of the config available as a variable we can reuse between multiple
clients as we add support for new services.
2015-10-05 22:47:44 -07:00
Radek Simko
cd96b8a7fc
provider/aws: Add efs_file_system
2015-10-03 19:35:06 -07:00
Martin Atkins
3fde993978
Merge #3336 : Remove local multierror package.
...
Instead, use ``github.com/hashicorp/go-multierror``.
2015-10-03 17:53:36 -07:00
Sander van Harmelen
2ba8dc38fa
Switch to go-multierror
...
It seems there are 4 locations left that use the `helper/multierror`
package, where the rest is TF settled on the `hashicorp/go-multierror`
package.
Functionally this doesn’t change anything, so I suggest to delete the
builtin version as it can only cause confusion (both packages have the
same name, but are still different types according to Go’s type system.
2015-09-27 18:58:48 -07:00
Sargurunathan Mohan
6b2d6f5ae4
go fmt code
2015-09-23 16:41:48 -07:00
Sargurunathan Mohan
803b33bcae
return nil and exit out of the function for IAM instance profiles
2015-09-23 16:40:46 -07:00
Radek Simko
b224abb7a9
provider/aws: Add cloudwatch_log_group
2015-09-16 22:28:01 +01:00
Paul Hinze
8559b02099
Merge pull request #3001 from sarguru/iam_profile_validation
...
Fail silently when account validation fails while from instance profile
2015-09-08 13:29:09 -05:00
Clint Shryock
0c2f189d08
provider/aws: Update to aws-sdk 0.9.0 rc1
2015-08-17 13:27:16 -05:00
Sargurunathan Mohan
9abd74819e
apply go fmt on config.go
2015-08-16 17:13:23 -07:00
Sargurunathan Mohan
b95e7a976c
fail silently when users have forbiddenaccount/allowedaccount configured while authenticating via iam profile instance
2015-08-14 03:52:38 -07:00
Clint Shryock
eb90457223
guard on both accessdenied (no IAM policy) and validationerror (no username specified)
2015-08-07 11:55:44 -05:00
Clint Shryock
31fab62bfd
provider/aws: Fail silently in ValidateCredentials for IAM users
2015-08-07 11:40:50 -05:00
Pablo Cantero
5930f22974
dynamodb-local Update AWS config
...
https://github.com/hashicorp/terraform/pull/2825#issuecomment-126353610
Tks @catsby
2015-07-30 12:21:03 -03:00
Pablo Cantero
28bef7c0c7
Merge branch 'master' into dynamodb-local
2015-07-30 12:16:07 -03:00
Clint Shryock
579ccbefea
provider/aws: Update source to comply with upstream breaking change
2015-07-28 15:29:46 -05:00
Pablo Cantero
35201e730e
dynamodb-local Add `dynamodb_endpoint` allowing to change the DynamoDB Endpoint for
...
example to connect to dynamodb-local
2015-07-22 18:57:29 -03:00
Radek Simko
4797a82e1a
aws: Simplify ValidateCredentials func
2015-07-21 15:57:59 +02:00
Clint Shryock
975e1a6c2c
provider/aws: Check credentials before attempting to do anything
2015-07-14 16:39:50 -05:00
Mitchell Hashimoto
93cedc7ec1
providers/aws: style nitpick
2015-06-28 22:46:49 -07:00
Mitchell Hashimoto
2a5ed6c847
Merge pull request #1841 from josharian/aws-external-creds
...
providers/aws: detect credentials more robustly
2015-06-28 22:43:56 -07:00
Alex Pilon
ceeb94e157
provider/aws: Add cloudwatch_metric_alarm
2015-06-17 23:10:23 +01:00
Clint
b132dd284e
Merge pull request #2121 from johnewart/dynamodb
...
DynamoDB Support
2015-06-17 09:47:13 -05:00