Commit Graph

10357 Commits

Author SHA1 Message Date
James Nugent
b59d6c8ce1 Merge pull request #6542 from hashicorp/azurerm-vm-validation
provider:azurerm: Add documentation for `azurerm_virtual_machine` adminPassword
2016-05-08 19:16:51 -04:00
stack72
fdb9293635 provider:azurerm: Add documentation for azurerm_virtual_machine
adminPassword

Reports from issues showed the following errors:

```
{
    "error": {
            "code": "InvalidParameter",
                    "target": "adminPassword",
                            "message": "The supplied password must be
                            between 6-72 characters long and must
                            satisfy at least 3 of password complexity
                            requirements from the following: \r\n1)
                            Contains an uppercase character\r\n2)
                            Contains a lowercase character\r\n3)
                            Contains a numeric digit\r\n4) Contains a
                            special character."

    }

}
```

This commit adds some documentation for the adminPassword complexity
requirements
2016-05-08 23:07:04 +01:00
stack72
712fc83a20 provider/azurerm: Fix an issue with azurerm_virtual_machine ssh_keys
ssh_keys were throwing an error similar to this:

```
* azurerm_virtual_machine.test: [DEBUG] Error setting Virtual Machine
* Storage OS Profile Linux Configuration: &errors.errorString{s:"Invalid
* address to set: []string{\"os_profile_linux_config\", \"0\",
* \"ssh_keys\"}"}
```

This was because of nesting of Set within a Set in the schema. By
changing this to a List within a Set, the schema works as expected. This
means we can now set SSH Keys on VMs. This has been tested using a
remote-exec and a connection block with the ssh key

```
azurerm_virtual_machine.test: Still creating... (2m10s elapsed)
azurerm_virtual_machine.test (remote-exec): Connected!
azurerm_virtual_machine.test (remote-exec): CONNECTED!
```
2016-05-08 22:51:51 +01:00
stack72
8dc123fd94 Scaffold the AWS DB Option Group resource
Change the AWS DB Instance to now include the DB Option Group param. Adds a test to prove that it works

Add acceptance tests for the AWS DB Option Group work. This ensures that Options can be added and updated

Documentation for the AWS DB Option resource
2016-05-08 20:18:53 +01:00
Paul Stack
1c3fff19d0 Update CHANGELOG.md 2016-05-08 19:30:21 +01:00
Paul Stack
dc30bd29fc provider/aws: Redshift Cluster not allowing 0 for (#6537)
automated_snapshot_retention_period

The default value for `automated_snapshot_retention_period` is 1.
Therefore, it can be included in the `CreateClusterInput` without
needing to check that it is set.

This was actually stopping people from setting the value to 0 (disabling
the snapshots) as there is an issue in `d.GetOk()` evaluating 0 for int
2016-05-08 19:29:36 +01:00
stack72
1937d0fb6a provider/aws: CloudTrail tests were failing as the names were not unique
per test run
2016-05-08 19:08:58 +01:00
Jason Wieringa
57a1001ac0 Fix documentation on autoscaling group (#6532)
As of sha d3697fa50b, enabled_metrics
is an optional setting.
2016-05-08 18:03:24 +01:00
arsdehnel
61c7cf9457 Change in CLI behavior
Just wanted to call out that the CLI prompts for values for unset variables instead of an error.  Guessing that was an enhancement somewhere along the line and just didn't get updated in the docs.
2016-05-07 20:52:06 -05:00
James Nugent
46702ad918 Update CHANGELOG.md 2016-05-07 12:38:47 -07:00
James Nugent
dd7da5a951 Merge pull request #6529 from hashicorp/f-triton-firewall-rule-exists
provider/triton: Recognize 404 for Firewall Rules
2016-05-07 12:36:46 -07:00
James Nugent
6e602b5dce deps: Update github.com/hashicorp/go-retryablehttp 2016-05-06 17:43:00 -07:00
James Nugent
84b79dbb9f deps: Fix Amazon EMR Godep package ref 2016-05-06 17:38:34 -07:00
James Nugent
747c8387d4 deps: Actually update Riviera files 2016-05-06 17:36:25 -07:00
James Nugent
2bfa8c9836 deps: Update github.com/jen20/riviera/... 2016-05-06 17:32:30 -07:00
James Nugent
f364265900 provider/triton: Recognize 404 for Firewall Rules 2016-05-06 16:51:20 -07:00
Paul Stack
49085d58b9 Update CHANGELOG.md 2016-05-07 00:14:52 +01:00
James Nugent
78283a95bc Merge pull request #6528 from hashicorp/b-arm-update-vm
provider/azurerm: Update `azurerm_virtual_machine` failed on adminPassword
2016-05-06 16:12:26 -07:00
stack72
2e174ca3d4 provider/azurerm: Update azurerm_virtual_machine failed on
adminPassword

The Azure API never returns the AdminPAssword (as is correct) from the
Read API call. Therefore on Create, we do not set the AdminPassword of
the vm as part of the state. The Same func is used for Create & Update,
therefore when we changed anything on the VM, we were getting the
following error:

```
statusCode:Conflict
serviceRequestId:f498a6c8-6e7a-420f-9788-400f18078921
statusMessage:{"error":{"code":"PropertyChangeNotAllowed","target":"adminPassword","message":"Changing property 'adminPassword' is not allowed."}}
```

To fix this, we need to excldue the AdminPassword from the Update func
if it is empty
2016-05-06 23:44:03 +01:00
Clint
10d3989585 Update CHANGELOG.md for AWS EIP change (#6525)
* Update CHANGELOG.md noting the change in aws_eip field private_ip
2016-05-06 15:49:06 -05:00
Clint
99e0aec769 provider/aws: Fix issue changing EIP Association (#6521)
provider/aws: Update EIP to use new associate_with_private_ip instead of private_ip
2016-05-06 15:38:39 -05:00
Radek Simko
f0cf6564ad Update CHANGELOG.md 2016-05-06 18:01:48 +01:00
John Engelman
14f6f90621 Support standard AWS config in the S3 remote backend. (#5270) 2016-05-06 17:52:18 +01:00
KOJIMA Kazunori
2476dcbcae provider/aws: Fix typo in error message (#6518) 2016-05-06 09:57:04 -05:00
James Nugent
f1031707f9 Update CHANGELOG.md 2016-05-05 21:51:45 -07:00
James Nugent
3785ea3c43 Merge pull request #6509 from meteor/glasser/datadog-schema
provider/datadog: fix code to match schema
2016-05-05 21:50:32 -07:00
David Glasser
bef1b58fda provider/datadog: fix code to match schema
On Create, notify_no_data was being ignored.

On Read and Update, no_data_timeframe was being misused.

There was also a redundant read of escalation_message on Create.
2016-05-05 16:51:17 -07:00
Paul Stack
df4ccdf5fa Update CHANGELOG.md 2016-05-05 22:59:39 +01:00
Justin Clark
380ada1019 provider/aws: Add agent_version argument to AWS_OPSWORKS_STACK 2016-05-05 22:56:44 +01:00
clint shryock
8129c0589c provider/aws: Require cookies for Cloudfront Distributions 2016-05-05 15:44:35 -05:00
Radek Simko
0648941063 Update CHANGELOG.md 2016-05-05 21:15:59 +01:00
Greg Thole
ebfc701265 provider/aws: AWS API Gateway request parameters json (#6501)
* Update docs with new parameters

* Add request parameters as JSON

* Update function name and error statements
2016-05-05 21:14:51 +01:00
Radek Simko
03bc54b438 Merge pull request #6500 from hashicorp/radeksimko-patch-1
aws: Update docs after #6385 (account ID via sts)
2016-05-05 18:01:33 +01:00
Radek Simko
d23fac3a28 aws: Update docs after #6385 (account ID via sts) 2016-05-05 17:51:44 +01:00
Radek Simko
069636ae9f Update CHANGELOG.md 2016-05-05 17:37:25 +01:00
Radek Simko
e32a8c1c5b Merge pull request #6385 from Ticketmaster/use-sts-GetCallerIdentity
provider/aws: Added sts:GetCallerIdentity to GetAccountId for federated logins
2016-05-05 17:35:32 +01:00
Clint
351701ec39 Update CHANGELOG.md 2016-05-05 10:49:32 -05:00
Clint
c58892485b provider/aws: Allow empty S3 config in Cloudfront Origin (#6487)
* provider/aws: Allow empty S3 config in Cloudfront Origin
2016-05-05 10:49:09 -05:00
Clint
be74cb2892 Update CHANGELOG.md 2016-05-05 10:18:28 -05:00
Clint
068f6f606d provider/aws: Fix issue in upgrading AutoScaling Policy (#6440)
* provider/aws: Fix issue in upgrading AutoScaling Policy min_adjustment_steps

- Update depreciation message on min_adjustment_step
2016-05-05 10:17:54 -05:00
thetuxkeeper
83f87e3741 fixed ipv6 - changed to Computed like ipv4 (#6480) 2016-05-05 15:38:45 +01:00
Kraig Amador
a23bcf2ec9 Added accountid to AWSClient and set it early in the initialization phase. We use iam.GetUser(nil) scattered around to get the account id, but this isn't the most reliable method. GetAccountId now uses one more method (sts:GetCallerIdentity) to get the account id, this works with federated users. 2016-05-05 07:02:12 -07:00
Kraig Amador
e04e87361f vendor: Updated github.com/aws/aws-sdk-go to v1.1.23 The new STS library includes GetCallerIdentity which can be used to build ARNs for RDS resources when using IAM roles 2016-05-05 07:02:10 -07:00
Paul Hinze
b4df304b47
helper/schema: Normalize bools to "true"/"false" in diffs
For a long time now, the diff logic has relied on the behavior of
`mapstructure.WeakDecode` to determine how various primitives are
converted into strings.  The `schema.DiffString` function is used for
all primitive field types: TypeBool, TypeInt, TypeFloat, and TypeString.

The `mapstructure` library's string representation of booleans is "0"
and "1", which differs from `strconv.FormatBool`'s "false" and "true"
(which is used in writing out boolean fields to the state).

Because of this difference, diffs have long had the potential for
cosmetically odd but semantically neutral output like:

    "true" => "1"
    "false" => "0"

So long as `mapstructure.Decode` or `strconv.ParseBool` are used to
interpret these strings, there's no functional problem.

We had our first clear functional problem with #6005 and friends, where
users noticed diffs like the above showing up unexpectedly and causing
troubles when `ignore_changes` was in play.

This particular bug occurs down in Terraform core's EvalIgnoreChanges.
There, the diff is modified to account for ignored attributes, and
special logic attempts to handle properly the situation where the
ignored attribute was going to trigger a resource replacement. That
logic relies on the string representations of the Old and New fields in
the diff to be the same so that it filters properly.

So therefore, we now get a bug when a diff includes `Old: "0", New:
"false"` since the strings do not match, and `ignore_changes` is not
properly handled.

Here, we introduce `TypeBool`-specific normalizing into `finalizeDiff`.
I spiked out a full `diffBool` function, but figuring out which pieces
of `diffString` to duplicate there got hairy. This seemed like a simpler
and more direct solution.

Fixes #6005 (and potentially others!)
2016-05-05 09:00:58 -05:00
Blake Smith
8821aea945 provider/aws: Add AWS EMR dependency (#2098) (#6492) 2016-05-05 11:34:18 +01:00
Radek Simko
4f2eec0c3a Update CHANGELOG.md 2016-05-05 11:15:28 +01:00
Kraig Amador
1f80ec48d0 Added RDS event subscriptions (#6367) 2016-05-05 11:14:25 +01:00
James Nugent
c8928e4f5d Update CHANGELOG.md 2016-05-04 14:11:33 -05:00
James Nugent
a7817c0710 Merge pull request #6469 from hashicorp/jt-ie-bnr
website: add a height to svg in bnr to fix IE bug
2016-05-04 14:10:01 -05:00
James Nugent
a7a6aba0d2 Merge pull request #6484 from stumbaumr/patch-1
provider/vsphere: Fix typos in README.
2016-05-04 14:09:10 -05:00