Martin Atkins
30bf83cdeb
helper/logging: Bring the LevelFilter into our own codebase
...
In order to make this work reasonably we can't avoid using some funny
heuristics, which are somewhat reasonable to apply within the context of
Terraform itself but would not be good to add to the general "logutils".
Specifically, this is adding the additional heuristic that lines starting
with spaces are continuation lines and so should inherit the log level
of the most recent non-continuation line.
2019-12-05 15:22:03 -08:00
Martin Atkins
6db3cf8e5b
vendor: upgrade Azure SDK and Azure/go-autorest
...
This involves some minor changes to the "azure" backend code to account
for upstream breaking changes.
2019-12-02 10:04:49 -08:00
Joaquín Fernández Campo
d2bc7c25b9
backend/artifactory: Honor HTTP_PROXY and HTTPS_PROXY environment variables
2019-11-06 14:18:33 -08:00
He Guimin
bfae627112
add a new field ecs_role_name to support more scenario
2019-11-02 00:09:46 +08:00
Martin Atkins
39e609d5fd
vendor: switch to HCL 2.0 in the HCL repository
...
Previously we were using the experimental HCL 2 repository, but now we'll
shift over to the v2 import path within the main HCL repository as part of
actually releasing HCL 2.0 as stable.
This is a mechanical search/replace to the new import paths. It also
switches to the v2.0.0 release of HCL, which includes some new code that
Terraform didn't previously have but should not change any behavior that
matters for Terraform's purposes.
For the moment the experimental HCL2 repository is still an indirect
dependency via terraform-config-inspect, so it remains in our go.sum and
vendor directories for the moment. Because terraform-config-inspect uses
a much smaller subset of the HCL2 functionality, this does still manage
to prune the vendor directory a little. A subsequent release of
terraform-config-inspect should allow us to completely remove that old
repository in a future commit.
2019-10-02 15:10:21 -07:00
Kristin Laemmert
006ef022e6
Merge pull request #22918 from hashicorp/mildwonkey/to-e2e-or-not-e2e
...
Sundry fixes to e2e tests
2019-09-27 08:46:04 -04:00
Kristin Laemmert
68dfc3046d
backend/remote-state: etcdv3, oss, and manta acc tests should fail
...
faster
The acceptance tests for etcdv3, oss and manta were not validating
required env variablea, chosing to assume that if one was running
acceptance tests they had already configured the credentials.
It was not always clear if this was a bug in the tests or the provider,
so I opted to make the tests fail faster when required attributes were
unset (or "").
2019-09-27 08:45:12 -04:00
Kristin Laemmert
5300f85a79
backend/manta: fix panic when insecure_skip_tls_verify was not set
...
The DefaultFunc for insecure_skip_tls_verify was sending an empty string
instead of a bool. Fixes to default to `false`.
2019-09-26 10:08:29 -04:00
Luis Silva
9ae8eca55d
Merge branch 'master' into 21680/GCS_OAUTH
2019-08-27 16:56:27 +01:00
yanndegat
be5280e4e1
remote-state/pg: add option to skip schema creation ( #21607 )
...
* add `skip_schema_creation` option
* add sanity check to avoid situations where postgres users
hasn't been granted the "CREATE SCHEMA" right
closes #21604
Signed-off-by: yann degat <yann@2kmail.net>
2019-08-27 11:14:32 -04:00
yuanye
b69c0b4199
oss backend support profile
2019-08-23 21:04:34 +08:00
James Bardin
10d94fb764
Merge pull request #21967 from williams-brian/SSE-C_Remote_State
...
Add support for SSE-C to S3 backend
2019-08-22 17:30:28 -04:00
Radek Simko
f3357aad45
vendor: Downgrade Azure dependencies
...
This is to allow Terraform providers to upgrade to at least
one more minor version of the plugin SDK without major UX hiccups.
This concludes (unsuccessful) experiments involving upgrades
to SDK with https://github.com/Azure/go-autorest/pull/455
Even with that patch all providers still experience broken UX
as described in https://github.com/hashicorp/terraform/pull/22490
This downgrade reduces the uncomfort to only a handful of providers
from >100s. The affected providers more or less directly depend on
Azure SDK(s), which is ~8.
Affected providers practically cannot consume Terraform Plugin SDK
with this patch (downgraded Azure SDKs) and can just wait for
extracted Terraform Plugin SDK which is planned to be released soon.
This reverts the following PRs:
- https://github.com/hashicorp/terraform/pull/22247
- https://github.com/hashicorp/terraform/pull/22248
- https://github.com/hashicorp/terraform/pull/22524
- https://github.com/hashicorp/terraform/pull/22525
and it is otherwise result of the following commands
```
go get github.com/Azure/azure-sdk-for-go@v21.3.0
go get github.com/hashicorp/go-azure-helpers@166dfd221bb2
go mod tidy
```
2019-08-20 15:52:11 +01:00
Radek Simko
dee450cf8c
vendor: Bump go-azure-helpers to 0.7.0
2019-08-20 09:32:02 +01:00
Roberto Jung Drebes
b459a92575
backend/gcs: Use new endpoints for Google OAuth
...
This is a consequence of googleapis/google-cloud-common#260 .
2019-08-13 15:24:34 -07:00
Alex Pilon
4bf43efcfd
move hcl2shim package to configs
2019-08-06 19:58:58 -04:00
Chris Marchesi
d43fc71135
modules: update go-azure-helpers to v0.5.0
...
To help address the issues posed on #22087 and #22085 .
2019-08-01 11:57:34 -07:00
He Guimin
a490dfa495
backend/oss: Support for assume role config
2019-07-30 23:27:17 +08:00
Pam Selle
23a187d85d
Merge pull request #21739 from hasheddan/s3-backend-comment-typo
...
s3 backend: minor typo in putMD5 comment
2019-07-12 14:01:26 -04:00
Colin Fowler
cd7bfba141
rebased to terraform master branch
2019-07-10 18:05:10 +01:00
Brian Williams
5e3c3bafb8
Add support for SSE-C to S3 backend
...
These changes add support for encrypting terraform remote-state in S3 using customer-supplied encryption keys (SSE-C).
2019-07-06 10:10:54 -05:00
Luis Silva
f6c90c1d96
Add OAuth2 token support for GCS backend
2019-07-05 10:06:44 +01:00
Daniel Mangum
3bc14620c0
backend/remote-state: remove dead code
...
This remote-state adapter is no longer used, because the old remote state
mechanism was removed in Terraform v0.12.
2019-06-18 14:18:05 -07:00
hasheddan
961d43142c
s3 backend: minor typo in putMD5 comment
...
Signed-off-by: hasheddan <georgedanielmangum@gmail.com>
2019-06-15 08:20:37 -05:00
kayrus
d06609dd23
Swift backend: add application credential support
2019-06-12 17:23:13 +02:00
Joe Topjian
d8343aa95f
backend/swift: Authentication updates
...
Support for cross-domain authentication has been added and mapping
environment variables to the correct domain settings has been
fixed.
In addition, support for clouds.yaml files has been added.
2019-06-12 08:05:54 -07:00
James Bardin
0c91d227fa
Merge branch 'master' into master
2019-06-10 15:50:59 -04:00
Ivan Kalita
5b6b1663ef
backend/http: implement retries for the http backend ( #19702 )
...
Fixes #19619
2019-06-05 16:12:07 -04:00
Mateusz Gozdek
b6de825723
backend/gcs: make Unlock error message more clear
2019-05-27 20:07:14 -07:00
Stephen Buergler
fc5b186e8d
Don't leak so many connections in the pg backend
...
This change fixes an error I get:
Error: pq: too many connections for role "asdf"
because I can only have so many connections.
2019-04-30 23:34:51 -05:00
He Guimin
3f44dd9dec
Add tablestore config to store state lock
2019-04-11 07:11:10 +08:00
He Guimin
b887d44712
Add Alibaba Cloud backend OSS with lock
2019-04-11 07:06:43 +08:00
Justin Downing
1e32ae243c
grammatical updates to comments and docs ( #20195 )
2019-03-21 14:05:41 -07:00
Stefan Schmidt
3ca1253796
backend/gcs: Mark the unused attributes project and region as removed.
...
These two attributes are not used since aec45e6967
.
2019-03-19 17:29:04 -07:00
Mars Hall
34fa67c6b0
Correct pg backend error info
2019-03-05 11:37:08 -08:00
Mars Hall
ccf549a62d
Stricter pg backend locking during workspace creation
2019-03-05 11:19:56 -08:00
Mars Hall
31c9776d55
Switch pg backend to session-level advisory locking, to avoid rollback of partial state updates
2019-03-04 17:01:08 -08:00
Brian Flad
e34a97abca
backend/s3: Add debug logging and user agent
...
Porting over previous behavior from terraform-provider-aws.
2019-02-27 12:59:08 -05:00
James Bardin
eada955721
Merge pull request #19070 from mars/postgres-backend
...
Postgres backend
2019-02-26 20:20:01 -05:00
Mars Hall
6d9e2048f4
Skip more pg backend acceptance tests
2019-02-26 16:50:36 -08:00
Mars Hall
920e7a7acc
Mutex pg backend‘s database transaction
2019-02-26 13:45:16 -08:00
Mars Hall
c6bf3442fc
Lock() in pg backend now returns LockError for retryable errors
2019-02-26 13:20:40 -08:00
Mars Hall
a075a68c58
Correct name of pg backend‘s default schema
2019-02-26 12:59:31 -08:00
James Bardin
dd16455a79
fix s3 default region to match provider
2019-02-25 20:27:21 -05:00
Mars Hall
2621f95bd2
📚 doc corrections
2019-02-25 16:30:30 -08:00
Mars Hall
b9a91b7c1e
Switch pg backend to use native Postgres locks
2019-02-25 16:05:53 -08:00
James Bardin
c814f2da37
Change backend.ValidateConfig to PrepareConfig
...
This mirrors the change made for providers, so that default values can
be inserted into the config by the backend implementation. This is only
the interface and method name changes, it does not yet add any default
values.
2019-02-25 18:37:20 -05:00
James Bardin
aebfecf871
Merge pull request #20211 from yanndegat/swift_remote_backend
...
Swift remote backend support for workspaces & locking
2019-02-25 12:58:59 -05:00
Mars Hall
8cb2943b6b
pg backend tests run when TF_ACC is set (no more TF_PG_TEST)
2019-02-22 14:42:24 -08:00
Mars Hall
c8b8227967
Compatibility fixes for 0.12.0
2019-02-22 13:54:41 -08:00