Commit Graph

14937 Commits

Author SHA1 Message Date
Mitchell Hashimoto
39e3d8ea9b
helper/variables: helpers for working with vars 2016-12-10 14:30:36 -05:00
James Bardin
626ad57546 Merge pull request #10643 from hashicorp/jbardin/GH-10640
Disaply interpolation strings for computed fields
2016-12-09 15:31:42 -05:00
Mitchell Hashimoto
4a38f5f534 Merge pull request #10642 from hashicorp/b-num-id
config: allow names to start with numbers
2016-12-09 14:42:21 -05:00
James Bardin
fc13a1b814 Disaply interpolation strings for computed fields
Displaying interpolations strings when possible for computed fields in
the plan output makes for a nicer UX
2016-12-09 13:30:00 -05:00
Paul Stack
e9896be90e Update CHANGELOG.md 2016-12-09 17:57:42 +00:00
Paul Stack
c69e325a1a provider/aws: Add support for AWS Lightsail Domain (#10637)
```
% make testacc TEST=./builtin/providers/aws TESTARGS='-run=TestAccAWSLightsailDomain_'
==> Checking that code complies with gofmt requirements...
go generate $(go list ./... | grep -v /terraform/vendor/)
2016/12/09 15:19:58 Generated command/internal_plugin_list.go
TF_ACC=1 go test ./builtin/providers/aws -v
-run=TestAccAWSLightsailDomain_ -timeout 120m
=== RUN   TestAccAWSLightsailDomain_basic
--- PASS: TestAccAWSLightsailDomain_basic (16.28s)
=== RUN   TestAccAWSLightsailDomain_disappears
--- PASS: TestAccAWSLightsailDomain_disappears (12.71s)
PASS
ok      github.com/hashicorp/terraform/builtin/providers/aws29.015s
```
2016-12-09 17:56:48 +00:00
Clint
640530e76f Update CHANGELOG.md 2016-12-09 11:52:00 -06:00
Clint
e705cd9a93 Merge pull request #10635 from dougneal/import_vpc_peerconn_accepter_fix
provider/aws: aws_vpc_peering_connection: import fix
2016-12-09 11:50:55 -06:00
Mitchell Hashimoto
148b8a12ea
website: remove BC from upgrade guide 2016-12-09 12:42:18 -05:00
Mitchell Hashimoto
cd1cd1cb7d
vendor: update HIL 2016-12-09 12:40:34 -05:00
Mitchell Hashimoto
b5f1738e17
config: allow IDs to start with numbers 2016-12-09 12:35:23 -05:00
Paul Stack
15814c3ecc Update CHANGELOG.md 2016-12-09 15:51:38 +00:00
Tom Wilkie
dd39296d6c Allow import of aws_security_groups with more than one source_security_group_id rule (#9477)
* Allow import of aws_security_groups with more than one source_security_group_id rule

* Add acceptable test for security group with multiple source rules.
2016-12-09 15:50:51 +00:00
Clint
e902ff320c Update CHANGELOG.md 2016-12-09 08:44:21 -06:00
Clint
5f765d9de6 Merge pull request #10624 from hashicorp/pr-9891
provider/aws: Add aws_snapshot_create_volume_permission resource (contd. #9891)
2016-12-09 08:43:18 -06:00
clint shryock
c54dba65b0 document snapshot_create_volume_permissions 2016-12-09 08:36:40 -06:00
Clint
e2fc12c38f Update CHANGELOG.md 2016-12-09 08:29:12 -06:00
Clint
0766074289 Merge pull request #10583 from hashicorp/f-lightsail-key-pair
provider/aws: Add Lightsail Key Pair resource
2016-12-09 08:26:00 -06:00
Doug Neal
24baa38408 provider/aws: aws_vpc_peering_connection: import fix
When importing an `aws_vpc_peering_connection`, the code assumes that
the account under Terraform control is the initiator (requester) of the
VPC peering request. This holds true when the peering connection is
between two VPCs in the same account, or when the peering connection has
been initiated from the controlled account to another.

However, when the peering connection has been initiated from a foreign
account towards the account under management, importing the peering
connection into the statefile results in values of `peer_vpc_id` and
`vpc_id` being the opposite way round to what they should be, and in the
`peer_owner_id` being set to the managed account's ID rather than the
foreign account's ID.

This patch checks the Accepter and Requester Owner IDs against the AWS
connection's reported owner ID, and reverses the mapping if it is
determined that the VPC peering connection is owned by the foreign
account.
2016-12-09 12:05:06 +00:00
Paul Stack
510c82c6d7 Update CHANGELOG.md 2016-12-09 09:42:54 +00:00
Peter McAtominey
6f21b78710 provider/azurerm: fix virtual_machine reading plan as the wrong type (#10626)
TF_ACC=1 go test ./builtin/providers/azurerm -v -run TestAccAzureRMVirtualMachine_plan -timeout 120m
=== RUN   TestAccAzureRMVirtualMachine_plan
--- PASS: TestAccAzureRMVirtualMachine_plan (798.75s)
PASS
ok  	github.com/hashicorp/terraform/builtin/providers/azurerm	798.835s
2016-12-09 10:41:45 +01:00
Paul Stack
6f2f92fc35 Update CHANGELOG.md 2016-12-09 09:35:48 +00:00
Eddy Hernandez
7e737dac62 Add support for AWS CA Central 1 Region (#10618)
* Add support for AWS CA Central 1 Region

* additional metadata for ca-central-1

* add elb metadata for ca-central-1
2016-12-09 10:35:07 +01:00
Mitchell Hashimoto
92faace610 release: clean up after v0.8.0-rc3 2016-12-09 05:07:23 +00:00
Mitchell Hashimoto
fce2be1773
v0.8.0-rc3 2016-12-09 05:01:06 +00:00
Mitchell Hashimoto
b874d55f36
v0.8.0-rc3 2016-12-09 04:55:56 +00:00
Mitchell Hashimoto
73cb292b6a
update CHANGELOG 2016-12-08 23:19:42 -05:00
Mitchell Hashimoto
124fbc10a6 Merge pull request #10628 from hashicorp/b-identifier
config: disallow names starting with ints
2016-12-08 23:18:55 -05:00
Mitchell Hashimoto
8b9e2c17cc
config: fix NameRegexp validation to allow single-char names 2016-12-08 23:13:19 -05:00
Mitchell Hashimoto
ef2500932d
website: update upgrade guide for number backwards incompat 2016-12-08 23:09:18 -05:00
Mitchell Hashimoto
6b458160b9
config: disallow names starting with ints
Fixes #10597

This disallows any names for variables, modules, etc. starting with
ints. This causes parse errors with the new HIL parser and actually
causes long term ambiguities if we allow this.

I've also updated the upgrade guide to note this as a backwards
compatibility and how people can fix this going forward.
2016-12-08 23:01:51 -05:00
clint shryock
42057045ff refactor the test to use caller_identity data source, and new ebs_snapshot resource 2016-12-08 16:43:03 -06:00
Jeremy Asher
185ee439da add wait after AWS snapshot attr modification
This adds up to a 5 minute wait after issuing an add or remove request
to adjust a snapshot's createVolumePermission attribute.
2016-12-08 16:12:25 -06:00
Jeremy Asher
f20d1c3caa WIP aws_snapshot_create_volume_permission tests 2016-12-08 16:12:24 -06:00
Jeremy Asher
7216185f0d implement aws_snapshot_create_volume_permission
This adds the new resource aws_snapshot_create_volume_permission which
manages the createVolumePermission attribute of snapshots.  This allows
granting an AWS account permissions to create a volume from a particular
snapshot.  This is often required to allow another account to copy a
private AMI.
2016-12-08 16:12:23 -06:00
clint shryock
97ac4bde16 implement name_prefix 2016-12-08 14:08:45 -06:00
Mitchell Hashimoto
12f4b5ecb8 Update CHANGELOG.md 2016-12-08 12:31:31 -05:00
Mitchell Hashimoto
6d4f63c7b2 Merge pull request #10615 from hashicorp/b-aws-encrypt-access-key-secrets
provider/aws: Encrypt aws_iam_access_key.secret with pgp
2016-12-08 12:30:44 -05:00
Mitchell Hashimoto
c002de9cf9 Merge pull request #10616 from hashicorp/b-catch-sigterm
Forward SIGTERM and handle that as an interrupt
2016-12-08 12:22:37 -05:00
Mitchell Hashimoto
e9c35eae32
Forward SIGTERM and handle that as an interrupt 2016-12-08 12:20:25 -05:00
clint shryock
1e8e83fa6a provider/aws: Encrypt aws_iam_access_key.secret with pgp
optionally encrypt the iam access key secret with a pgp key
2016-12-08 11:08:05 -06:00
Paul Stack
9c80c82d9e Update CHANGELOG.md 2016-12-08 17:07:32 +01:00
Peter McAtominey
56344eb98d provider/azurerm: fix servicebus_topic max_size_in_megabytes for premium namespaces (#10611)
The value is only multiplied by the API for topics in non-premium namespaces

TF_ACC=1 go test ./builtin/providers/azurerm -v -run TestAccAzureRMServiceBusTopic_enablePartitioning -timeout 120m
=== RUN   TestAccAzureRMServiceBusTopic_enablePartitioningStandard
--- PASS: TestAccAzureRMServiceBusTopic_enablePartitioningStandard (378.80s)
=== RUN   TestAccAzureRMServiceBusTopic_enablePartitioningPremium
--- PASS: TestAccAzureRMServiceBusTopic_enablePartitioningPremium (655.00s)
PASS
ok  	github.com/hashicorp/terraform/builtin/providers/azurerm	1033.874s
2016-12-08 17:06:27 +01:00
Doug Neal
195b041cd5 Validate effect in aws_iam_policy_document data source (#10608)
AWS allows only the case-sensitive strings `Allow` and `Deny` to appear
in the `Effect` fields of IAM policy documents. Catch deviations from
this, including mis-casing, before hitting the API and generating an
error (the error is a generic 400 and doesn't indicate what part of the
policy doc is invalid).
2016-12-08 16:16:40 +01:00
stack72
9801c65c9e
Merge branch 'manojlds-patch-2' 2016-12-08 12:54:13 +01:00
stack72
32b81ab209
docs: Update getting-started guide to suggest remote-state 2016-12-08 12:53:34 +01:00
stack72
ff8c948cf5
Merge branch 'patch-2' of https://github.com/manojlds/terraform into manojlds-patch-2 2016-12-08 12:49:03 +01:00
Paul Stack
0244b8b110 Update CHANGELOG.md 2016-12-08 12:07:57 +01:00
Ninir
7f69f37318 provider/aws: Improvde the Cloudfront documentation when using s3 origins (#10087) 2016-12-08 12:01:18 +01:00
Paul Stack
b03af1416e Update CHANGELOG.md 2016-12-08 11:59:41 +01:00