TANABE Ken-ichi
5c1dabdb69
provider/aws: Add ProxyProtocol support via aws_proxy_protocol_policy
2015-04-30 17:56:46 +09:00
Clint Shryock
0c5011bea4
provider/aws: Fix issue with empty IPRanges
2015-04-21 10:57:50 -05:00
Clint Shryock
3e6822ce08
more cleans ups of SDK reference
2015-04-16 15:28:18 -05:00
Clint Shryock
79fc8223bb
consolidate structure.go
2015-04-16 15:18:01 -05:00
Clint Shryock
1545dbb803
provider/aws: Convert Route 53 Zone, Record to upstream
2015-04-16 13:41:38 -05:00
Clint Shryock
29a5d9fc1a
Update how we expand/flatten TXT records for Route 53
2015-04-08 13:58:23 -05:00
Clint Shryock
f2b68c4ca8
provider/aws: Fix issue in updating Route 53 records on refresh/read.
...
Route 53 records were silently erroring out when saving the records returned
from AWS, because they weren't being presented as an array of strings like we
expected.
2015-04-08 09:06:15 -05:00
Clint
df514c9003
Merge pull request #1149 from peterbeams/master
...
Support AWS Elastic Network Interfaces (ENI)
2015-03-19 11:04:30 -05:00
Mitchell Hashimoto
d823a8cf81
providers/aws: fix security group self ingress rules on EC2-classic
2015-03-18 13:47:59 +00:00
Peter Beams
e4214a9983
ran go fmt and made 1 fix after running tests again
2015-03-17 13:00:36 +00:00
Peter Beams
34d2efa7df
moving expand/flatten methods into structure.go and unit testing them
2015-03-17 12:42:05 +00:00
Clint Shryock
28fbd971fc
Retire goamz
2015-03-13 09:42:50 -05:00
Clint Shryock
580b696e7f
Strike 'goamz' from the repo'
2015-03-12 16:49:38 -05:00
Clint Shryock
3977256c17
Cleansup: Restore expandIPPerms, remove flattenIPPerms
2015-03-10 16:35:49 -05:00
Clint Shryock
20b02cacd4
provider/aws: Convert AWS Security Group to aws-sdk-go
...
Convert security group test too
2015-03-09 11:45:58 -05:00
Clint Shryock
da55f9bf85
provider/aws: Convert AWS ELB to aws-sdk-go
2015-03-02 09:44:06 -06:00
Clint Shryock
242cdc7a29
provider/aws: Convert RDS DB Parameter group to aws-sdk-go
2015-02-26 09:33:33 -06:00
Phil Frost
8eb5418c4a
Implement apply_method for RDS parameters
...
This is necessary to support creating parameter groups with parameters
that require a reboot, since the RDS API will return an error when
attempting to set those parameters with ApplyMethod "immediate".
2015-01-30 13:06:15 -05:00
Sander van Harmelen
9797881ed8
Updating the tests and refactoring the code a little
...
There was an error in the goamz package the prevented updating the
availability zones correctly. So PR #181 should be merged before this
one can be merged…
2014-12-16 15:21:25 +01:00
Sander van Harmelen
3aeba87e38
Updating the resource to use a set instead of a list
...
By using a set for the availability zones, you can use things like
`availability_zones = ["${aws_instance.web.*.availability_zone}"]`
where is very likely multiple of the same zones will be added to the
set. If you use a list here, the list will say it’s changed (even if
you add the same zone) which will force a new resource.
2014-12-16 13:13:59 +01:00
Sander van Harmelen
d3e1a6678d
Making some last tweaks and fixing some acc tests
2014-11-24 21:22:18 +01:00
Rob Costanzo
a14da63a39
Fixed bug with final_snapshot_identifier and skip_final_snapshot and removed apply_method as an option for now and am only supporting immediate mode
2014-11-05 11:03:06 -08:00
Rob Costanzo
0e3afa6d3d
Fixed incorrect ForcesNew settings for parameters and added better acceptance tests to ensure updates are working as expected
2014-11-05 11:03:06 -08:00
Rob Costanzo
3b54001a1b
Added missing update support for new aws_db_parameter_group resource
2014-11-05 11:03:06 -08:00
Rob Costanzo
de16b10555
Added new aws_db_parameter_group resource for creating RDS DB Parameter Groups.
...
Added plumbing to allow an optional DBParameterGroupName to be passed when creating an RDS DB instance.
2014-11-05 11:03:06 -08:00
Mitchell Hashimoto
f63a5d24e9
helper/schema: diffs for sets should include the full set [GH-457]
...
Prior to this, the diff only contained changed set elements. The issue
with this is that `getSet`, the internal function that reads a set from
the ResourceData, expects that each level (state, config, diff, etc.)
has the _full set_ information. This change was done to fix merging
issues.
Because of this, we need to make sure the full set is visible in the
diff.
2014-10-21 10:49:53 -07:00
Mitchell Hashimoto
152d5b0c69
providers/aws: elb properly hashes listeners
2014-10-16 18:02:03 -07:00
Mitchell Hashimoto
1a2afdaa37
providers/aws: launch config and autoscale group load is correct
...
[GH-423]
2014-10-16 16:39:58 -07:00
Mitchell Hashimoto
51d66b678d
providers/aws: resource ELB listeners [GH-314]
2014-10-10 16:35:52 -07:00
Mitchell Hashimoto
12ff354749
providers/aws: convert most of ELB to schema
2014-10-09 23:58:48 -07:00
Mitchell Hashimoto
3aa655ad3b
helper/schema: test schema diffs with the interpolation splits
2014-10-09 16:31:24 -07:00
Panagiotis Moustafellos
d01418270a
Add listener.ssl_certificate_id support to AWS ELB (@jpadvo [GH-176])
2014-10-02 05:19:36 +03:00
Mitchell Hashimoto
dbc890e401
providers/aws: add `self` to ingress [GH-219]
2014-09-30 14:19:16 -07:00
Mitchell Hashimoto
a594ef9a28
providers/aws: expandIPPerms works again
2014-08-20 11:18:16 -07:00
Jason Padvorac
8d97c3656c
Add listener.ssl_certificate_id support to AWS ELB
2014-08-10 17:16:53 -07:00
Alek Storm
7109b8c770
Implement specification of AWS security groups in ingress rules as <owner>/<id>
2014-08-08 11:51:18 -07:00
Jack Pearkes
7adc6162d8
providers/aws: add test for health check, save health check state
...
cc/ @vertis
I added an acceptance test here, as well as making it so we
saved the health check state on update_state.
2014-07-30 10:15:22 -04:00
Jack Pearkes
4f2026f6c6
providers/aws: only flatten cidr if they exist
...
fixes #87
2014-07-29 10:29:48 -04:00
Jack Pearkes
da4ddef136
providers/aws: fix assertion of non-required cidr blocks in sec groups
...
fixes #65 , #86
2014-07-29 10:05:32 -04:00
Jack Pearkes
298483131b
providers/aws: fixed tons of aws stuff
2014-07-24 18:50:33 -04:00
Mitchell Hashimoto
79dbd07679
providers/aws: no empty security groups when flattening ip perms
...
/cc @pearkes - A few things here:
First, this fixes the issue you mentioned to be in chat. Basically: if
there are no security groups, don't put it into flatten, because flatten
will include a "key.#" = "0".
Next, I transformed your test into a "table-driven" test which are really
nice to write and maintain. Basically, as you find bugs or edge cases, you can
just add to the table and you get the test for free. I recommend these
whereever you have a pure input to output sort of data transformation
function.
2014-07-16 18:32:36 -07:00
Jack Pearkes
bcc6f884b1
providers/aws: actually return ingress rule on refresh, tests
2014-07-16 20:14:01 -04:00
Jack Pearkes
901785d04a
providers/aws: expand wildcard string lists
2014-07-16 18:51:50 -04:00
Jack Pearkes
1e81b13943
providers/aws: elb updates
2014-07-16 17:02:54 -04:00
Jack Pearkes
305994036d
providers/aws: add createlaunchocnfiguration
2014-07-10 14:15:58 -04:00
Jack Pearkes
930e3260ad
providers/aws: handle empty list configs, weird lb special case
2014-07-09 19:30:39 -04:00
Jack Pearkes
62a311a341
providers/aws: add autoscalinggroup
2014-07-09 19:00:30 -04:00
Jack Pearkes
5ad8d418f2
providers/aws: sg flattening of refresh
2014-07-08 20:25:52 -04:00
Jack Pearkes
637d68140c
providers/aws: ingress and egress rules
2014-07-08 17:47:03 -04:00
Jack Pearkes
47468c32a4
providers/aws: egress and ingress for sg
2014-07-08 16:34:10 -04:00
Jack Pearkes
0f64ff9387
providers/aws: availability_zones and expandList
2014-07-07 10:07:06 -04:00
Jack Pearkes
1b6faa0eb9
providers/aws: helper for expanding listeners
2014-07-07 10:07:06 -04:00