Commit Graph

35 Commits

Author SHA1 Message Date
Phil Frost 8eb5418c4a Implement apply_method for RDS parameters
This is necessary to support creating parameter groups with parameters
that require a reboot, since the RDS API will return an error when
attempting to set those parameters with ApplyMethod "immediate".
2015-01-30 13:06:15 -05:00
Sander van Harmelen 9797881ed8 Updating the tests and refactoring the code a little
There was an error in the goamz package the prevented updating the
availability zones correctly. So PR #181 should be merged before this
one can be merged…
2014-12-16 15:21:25 +01:00
Sander van Harmelen 3aeba87e38 Updating the resource to use a set instead of a list
By using a set for the availability zones, you can use things like
`availability_zones = ["${aws_instance.web.*.availability_zone}"]`
where is very likely multiple of the same zones will be added to the
set. If you use a list here, the list will say it’s changed (even if
you add the same zone) which will force a new resource.
2014-12-16 13:13:59 +01:00
Sander van Harmelen d3e1a6678d Making some last tweaks and fixing some acc tests 2014-11-24 21:22:18 +01:00
Rob Costanzo a14da63a39 Fixed bug with final_snapshot_identifier and skip_final_snapshot and removed apply_method as an option for now and am only supporting immediate mode 2014-11-05 11:03:06 -08:00
Rob Costanzo 0e3afa6d3d Fixed incorrect ForcesNew settings for parameters and added better acceptance tests to ensure updates are working as expected 2014-11-05 11:03:06 -08:00
Rob Costanzo 3b54001a1b Added missing update support for new aws_db_parameter_group resource 2014-11-05 11:03:06 -08:00
Rob Costanzo de16b10555 Added new aws_db_parameter_group resource for creating RDS DB Parameter Groups.
Added plumbing to allow an optional DBParameterGroupName to be passed when creating an RDS DB instance.
2014-11-05 11:03:06 -08:00
Mitchell Hashimoto f63a5d24e9 helper/schema: diffs for sets should include the full set [GH-457]
Prior to this, the diff only contained changed set elements. The issue
with this is that `getSet`, the internal function that reads a set from
the ResourceData, expects that each level (state, config, diff, etc.)
has the _full set_ information. This change was done to fix merging
issues.

Because of this, we need to make sure the full set is visible in the
diff.
2014-10-21 10:49:53 -07:00
Mitchell Hashimoto 152d5b0c69 providers/aws: elb properly hashes listeners 2014-10-16 18:02:03 -07:00
Mitchell Hashimoto 1a2afdaa37 providers/aws: launch config and autoscale group load is correct
[GH-423]
2014-10-16 16:39:58 -07:00
Mitchell Hashimoto 51d66b678d providers/aws: resource ELB listeners [GH-314] 2014-10-10 16:35:52 -07:00
Mitchell Hashimoto 12ff354749 providers/aws: convert most of ELB to schema 2014-10-09 23:58:48 -07:00
Mitchell Hashimoto 3aa655ad3b helper/schema: test schema diffs with the interpolation splits 2014-10-09 16:31:24 -07:00
Panagiotis Moustafellos d01418270a Add listener.ssl_certificate_id support to AWS ELB (@jpadvo [GH-176]) 2014-10-02 05:19:36 +03:00
Mitchell Hashimoto dbc890e401 providers/aws: add `self` to ingress [GH-219] 2014-09-30 14:19:16 -07:00
Mitchell Hashimoto a594ef9a28 providers/aws: expandIPPerms works again 2014-08-20 11:18:16 -07:00
Jason Padvorac 8d97c3656c Add listener.ssl_certificate_id support to AWS ELB 2014-08-10 17:16:53 -07:00
Alek Storm 7109b8c770 Implement specification of AWS security groups in ingress rules as <owner>/<id> 2014-08-08 11:51:18 -07:00
Jack Pearkes 7adc6162d8 providers/aws: add test for health check, save health check state
cc/ @vertis

I added an acceptance test here, as well as making it so we
saved the health check state on update_state.
2014-07-30 10:15:22 -04:00
Jack Pearkes 4f2026f6c6 providers/aws: only flatten cidr if they exist
fixes #87
2014-07-29 10:29:48 -04:00
Jack Pearkes da4ddef136 providers/aws: fix assertion of non-required cidr blocks in sec groups
fixes #65, #86
2014-07-29 10:05:32 -04:00
Jack Pearkes 298483131b providers/aws: fixed tons of aws stuff 2014-07-24 18:50:33 -04:00
Mitchell Hashimoto 79dbd07679 providers/aws: no empty security groups when flattening ip perms
/cc @pearkes - A few things here:

First, this fixes the issue you mentioned to be in chat. Basically: if
there are no security groups, don't put it into flatten, because flatten
will include a "key.#" = "0".

Next, I transformed your test into a "table-driven" test which are really
nice to write and maintain. Basically, as you find bugs or edge cases, you can
just add to the table and you get the test for free. I recommend these
whereever you have a pure input to output sort of data transformation
function.
2014-07-16 18:32:36 -07:00
Jack Pearkes bcc6f884b1 providers/aws: actually return ingress rule on refresh, tests 2014-07-16 20:14:01 -04:00
Jack Pearkes 901785d04a providers/aws: expand wildcard string lists 2014-07-16 18:51:50 -04:00
Jack Pearkes 1e81b13943 providers/aws: elb updates 2014-07-16 17:02:54 -04:00
Jack Pearkes 305994036d providers/aws: add createlaunchocnfiguration 2014-07-10 14:15:58 -04:00
Jack Pearkes 930e3260ad providers/aws: handle empty list configs, weird lb special case 2014-07-09 19:30:39 -04:00
Jack Pearkes 62a311a341 providers/aws: add autoscalinggroup 2014-07-09 19:00:30 -04:00
Jack Pearkes 5ad8d418f2 providers/aws: sg flattening of refresh 2014-07-08 20:25:52 -04:00
Jack Pearkes 637d68140c providers/aws: ingress and egress rules 2014-07-08 17:47:03 -04:00
Jack Pearkes 47468c32a4 providers/aws: egress and ingress for sg 2014-07-08 16:34:10 -04:00
Jack Pearkes 0f64ff9387 providers/aws: availability_zones and expandList 2014-07-07 10:07:06 -04:00
Jack Pearkes 1b6faa0eb9 providers/aws: helper for expanding listeners 2014-07-07 10:07:06 -04:00