Commit Graph

186 Commits

Author SHA1 Message Date
Luke Chadwick 0eed0908df Add health_check to aws_elb resource 2014-07-30 21:46:51 +10:00
Jack Pearkes af62002c1b go fmt 2014-07-29 19:09:55 -04:00
Jack Pearkes 77697b9936 providers/aws: add failing test for aws region validation
cc/ @jorgeng87
2014-07-29 19:09:17 -04:00
Jorge Núñez aad0fec940 Update test with valid AWS region 2014-07-30 00:22:50 +02:00
Jorge Núñez 5900b3f1c0 Add AWS region validation 2014-07-30 00:22:37 +02:00
Luke Chadwick 15bdf8b5f9 Add user_data to aws_launch_configuration 2014-07-30 07:30:24 +10:00
Jack Pearkes cbcb559c0c providers/aws: add failing test for reorder ingress rules bug 2014-07-29 15:03:51 -04:00
Jack Pearkes 6653542466 providers/aws: fix order of ingress rules on security group 2014-07-29 12:45:57 -04:00
Jack Pearkes dbe6b74884 providers/aws: depend on security groups, failing test for #87 2014-07-29 12:15:42 -04:00
Jack Pearkes d47e3f76ea providers/aws: fix spelling of desired_capacity
see #78
2014-07-29 10:43:18 -04:00
Jack Pearkes 4f2026f6c6 providers/aws: only flatten cidr if they exist
fixes #87
2014-07-29 10:29:48 -04:00
Jack Pearkes 86c7aeb8a6 providers/aws: use merged reosource state for associate_public_ip
cc/ @vertis
2014-07-29 10:23:48 -04:00
Jack Pearkes fa13a12a6e Merge pull request #85 from vertis/aws_associate_public_ip_address
Add associate_public_ip_address as an attribute on the aws_instance resource
2014-07-29 10:15:32 -04:00
Jack Pearkes da4ddef136 providers/aws: fix assertion of non-required cidr blocks in sec groups
fixes #65, #86
2014-07-29 10:05:32 -04:00
Luke Chadwick 974074fee9 Add associate_public_ip_address as an attribute of the aws_instance resource 2014-07-29 22:06:53 +10:00
Armon Dadgar be1ae66d86 provider/aws: fixing tests 2014-07-28 13:27:55 -04:00
Armon Dadgar 8c69536b3b provider/aws: fixing security groups test 2014-07-28 13:14:24 -04:00
Jack Pearkes f6fa012e82 providers/aws: remove security_group_update 2014-07-28 13:13:29 -04:00
Armon Dadgar c2677b3c0a provider/aws: More strict check 2014-07-28 12:50:19 -04:00
Armon Dadgar c8d5ea4d9d provider/aws: fixing instance for EC2-VPC /cc:@pearkes 2014-07-28 12:47:40 -04:00
Armon Dadgar bc64366a92 provider/aws: Less aggressive API rate 2014-07-28 12:10:35 -04:00
Armon Dadgar ebd50ab6ff provider/aws: Fixing EIP in EC2-VPC 2014-07-28 12:05:00 -04:00
Armon Dadgar c3b0417678 provider/aws: Fixing tests 2014-07-28 11:27:58 -04:00
Armon Dadgar e596feb42b provider/aws: Fixing launch config depdency 2014-07-28 11:27:58 -04:00
Jack Pearkes 7ef47671b0 providers/aws: only security group and instances if we have them 2014-07-27 21:20:03 -04:00
Armon Dadgar 18333f149e provider/aws: route53 zone detects deletion 2014-07-26 21:24:20 -04:00
Mitchell Hashimoto b1fc87fe59 providers/aws/aws_eip: support update (reassociation)
/cc @pearkes - woot
2014-07-26 15:53:26 -07:00
Jack Pearkes 298483131b providers/aws: fixed tons of aws stuff 2014-07-24 18:50:33 -04:00
Armon Dadgar ca43c44a85 providers/aws: Re-order entries 2014-07-23 23:35:03 -04:00
Armon Dadgar 5065aff158 provider/aws: Improve validation of configs 2014-07-23 15:14:35 -04:00
Jack Pearkes 703d115638 providers/aws: remove logging 2014-07-23 09:16:23 -04:00
Jack Pearkes 27fe1e0226 rds: fix engine version 2014-07-22 23:13:58 -04:00
Armon Dadgar b6503a7810 provider/aws: Adding route53 records support 2014-07-22 23:08:41 -04:00
Jack Pearkes b924151914 rds: add attribute checks 2014-07-22 22:54:18 -04:00
Jack Pearkes 4da83b9eca providers/aws: db sec group 2014-07-22 22:23:09 -04:00
Jack Pearkes dde83f7cdd providers/aws: slow down the wait for state for dbinstance 2014-07-22 18:45:59 -04:00
Armon Dadgar 12d54bd949 provider/aws: Slow down our r53 waits 2014-07-22 18:44:59 -04:00
Armon Dadgar 8e7e65770d provider/aws: Support for Route53 zones 2014-07-22 17:55:19 -04:00
Jack Pearkes 2f26ac97c2 providers/aws: add rds 2014-07-22 16:26:58 -04:00
Armon Dadgar 64f7a1dc89 provider/aws: Adding support for aws_s3_bucket 2014-07-21 14:34:50 -04:00
Mitchell Hashimoto 916ca711ad providers/aws/aws_security_group: we need to check for one other error 2014-07-17 11:28:40 -07:00
Mitchell Hashimoto 99ac8fc68e providers/aws/aws_security_group: wait for it to exist 2014-07-17 11:14:51 -07:00
Mitchell Hashimoto 388bcfa7b4 providers/aws: VPC assignment fix, and dependencies for destroy 2014-07-17 10:03:15 -07:00
Mitchell Hashimoto 24ecb1ae70 providers/aws/aws_vpc: fix error message referencing ELB 2014-07-17 09:46:31 -07:00
Mitchell Hashimoto d956880e2f providers/aws/aws_route_table: can set routes on instance_id 2014-07-17 09:21:55 -07:00
Mitchell Hashimoto 79dbd07679 providers/aws: no empty security groups when flattening ip perms
/cc @pearkes - A few things here:

First, this fixes the issue you mentioned to be in chat. Basically: if
there are no security groups, don't put it into flatten, because flatten
will include a "key.#" = "0".

Next, I transformed your test into a "table-driven" test which are really
nice to write and maintain. Basically, as you find bugs or edge cases, you can
just add to the table and you get the test for free. I recommend these
whereever you have a pure input to output sort of data transformation
function.
2014-07-16 18:32:36 -07:00
Jack Pearkes bcc6f884b1 providers/aws: actually return ingress rule on refresh, tests 2014-07-16 20:14:01 -04:00
Mitchell Hashimoto a6bb0144a6 providers/aws: remove some debug 2014-07-16 16:46:28 -07:00
Mitchell Hashimoto 0d8f6645fa providers/aws/aws_instance: user_data diffs properly 2014-07-16 16:41:20 -07:00
Jack Pearkes 901785d04a providers/aws: expand wildcard string lists 2014-07-16 18:51:50 -04:00