Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

merge from origin #1

Merged
merged 38 commits into from
Sep 18, 2018
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
38 commits
Select commit Hold shift + click to select a range
799229d
now returns cert thumbprint as HEX
Sep 10, 2018
1fa8116
Adding back in the rest of the changelog
tombuildsstuff Sep 11, 2018
f56bc25
updates from PR comments
Sep 11, 2018
2661b4e
updated documentation
Sep 11, 2018
2332f7c
Merge pull request #1904 from steve-hawkins/cert_thumbprint
katbyte Sep 11, 2018
66f8d24
Update CHANGELOG.md to include #1904
katbyte Sep 11, 2018
98271b7
Upgrading to v10.15.4 of github.com/Azure/go-autorest (#1909)
tombuildsstuff Sep 11, 2018
bce918a
Updating to include #1909
tombuildsstuff Sep 11, 2018
9a75165
VM Contributor build-in permissions actions count increase.
lrxtom2 Sep 12, 2018
e0c11ee
Merge pull request #1912 from lrxtom2/virtualMachineContributor
katbyte Sep 12, 2018
174bfdd
:bug: (.gitignore file.) Add .go-version into list. (#1910)
metacpp Sep 12, 2018
bfb150c
Update start_ip_address documentation (#1916)
tylerdave Sep 12, 2018
e0cfc37
New Resource: `azurerm_mysql_virtual_network_rule` (#1879)
tombuildsstuff Sep 12, 2018
91dae6e
Updating to include #1879
tombuildsstuff Sep 12, 2018
3373882
VM/VMSS: support for `StandardSSD_LRS` managed disk type (#1901)
ira-bryndzei Sep 12, 2018
380dbd5
Updating to include #1901
tombuildsstuff Sep 12, 2018
22f244b
AzureStack: backport virtual network gateway connection PR comments (…
katbyte Sep 12, 2018
51bcad1
Updating to include #1899
tombuildsstuff Sep 12, 2018
cadce83
Service bus fixed when sku set to premium (#1908)
lrxtom2 Sep 12, 2018
a9ce16b
Updating to include #1908
tombuildsstuff Sep 12, 2018
417c0da
Update resource_arm_logic_app_trigger_http_request.go
alastairtree Sep 12, 2018
e710306
Update application_gateway.html.markdown (#1922)
alex-darby Sep 13, 2018
3c410aa
Log Analytics Solution: removing crash points/refactoring
tombuildsstuff Sep 13, 2018
acf0849
Update TimeSpan documentation in Service Bus Queue/Topic (#1921)
Sep 13, 2018
8e0d2c8
Updating to include #1921
tombuildsstuff Sep 13, 2018
3485c1e
test: logic app http trigger allows params in url
alastairtree Sep 13, 2018
060d265
Merge pull request #1918 from alastairtree/patch-1
katbyte Sep 13, 2018
4404b45
Update CHANGELOG.md to include #1918
katbyte Sep 13, 2018
caf6732
Merge pull request #1923 from terraform-providers/crash-1919
katbyte Sep 13, 2018
08ef14e
New Resources: `azurerm_firewall` & `azurerm_firewall_network_rule_co…
hbuckle Sep 13, 2018
91afd3d
Updating to include #1627
tombuildsstuff Sep 13, 2018
98699ef
fixs public IP import bug wrt idle timeout & some minor refactoring
katbyte Sep 14, 2018
6d60bcd
updates requested by PR
katbyte Sep 14, 2018
4f7a9e8
v1.15.0
Sep 14, 2018
6f5d27e
Cleanup after v1.15.0 release
Sep 14, 2018
dd19d9e
Merge pull request #1925 from terraform-providers/b-publicip-idle_tim…
katbyte Sep 14, 2018
48951ea
Update CHANGELOG.md to include #1925
katbyte Sep 14, 2018
3816b0a
Update CHANGELOG.md
katbyte Sep 14, 2018
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
3 changes: 3 additions & 0 deletions .gitignore
Original file line number Diff line number Diff line change
Expand Up @@ -33,3 +33,6 @@ website/vendor
!command/test-fixtures/**/.terraform/

.env.sh

# goenv version file
.go-version
733 changes: 718 additions & 15 deletions CHANGELOG.md

Large diffs are not rendered by default.

10 changes: 10 additions & 0 deletions azurerm/config.go
Original file line number Diff line number Diff line change
Expand Up @@ -141,6 +141,7 @@ type ArmClient struct {
mysqlDatabasesClient mysql.DatabasesClient
mysqlFirewallRulesClient mysql.FirewallRulesClient
mysqlServersClient mysql.ServersClient
mysqlVirtualNetworkRulesClient mysql.VirtualNetworkRulesClient
postgresqlConfigurationsClient postgresql.ConfigurationsClient
postgresqlDatabasesClient postgresql.DatabasesClient
postgresqlFirewallRulesClient postgresql.FirewallRulesClient
Expand Down Expand Up @@ -184,6 +185,7 @@ type ArmClient struct {
// Networking
applicationGatewayClient network.ApplicationGatewaysClient
applicationSecurityGroupsClient network.ApplicationSecurityGroupsClient
azureFirewallsClient network.AzureFirewallsClient
expressRouteAuthsClient network.ExpressRouteCircuitAuthorizationsClient
expressRouteCircuitClient network.ExpressRouteCircuitsClient
expressRoutePeeringsClient network.ExpressRouteCircuitPeeringsClient
Expand Down Expand Up @@ -602,6 +604,10 @@ func (c *ArmClient) registerDatabases(endpoint, subscriptionId string, auth auto
c.configureClient(&mysqlServersClient.Client, auth)
c.mysqlServersClient = mysqlServersClient

mysqlVirtualNetworkRulesClient := mysql.NewVirtualNetworkRulesClientWithBaseURI(endpoint, subscriptionId)
c.configureClient(&mysqlVirtualNetworkRulesClient.Client, auth)
c.mysqlVirtualNetworkRulesClient = mysqlVirtualNetworkRulesClient

// PostgreSQL
postgresqlConfigClient := postgresql.NewConfigurationsClientWithBaseURI(endpoint, subscriptionId)
c.configureClient(&postgresqlConfigClient.Client, auth)
Expand Down Expand Up @@ -753,6 +759,10 @@ func (c *ArmClient) registerNetworkingClients(endpoint, subscriptionId string, a
c.configureClient(&appSecurityGroupsClient.Client, auth)
c.applicationSecurityGroupsClient = appSecurityGroupsClient

azureFirewallsClient := network.NewAzureFirewallsClientWithBaseURI(endpoint, subscriptionId)
c.configureClient(&azureFirewallsClient.Client, auth)
c.azureFirewallsClient = azureFirewallsClient

expressRouteAuthsClient := network.NewExpressRouteCircuitAuthorizationsClientWithBaseURI(endpoint, subscriptionId)
c.configureClient(&expressRouteAuthsClient.Client, auth)
c.expressRouteAuthsClient = expressRouteAuthsClient
Expand Down
2 changes: 1 addition & 1 deletion azurerm/data_source_builtin_role_definition_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -91,7 +91,7 @@ func TestAccDataSourceAzureRMBuiltInRoleDefinition_virtualMachineContributor(t *
resource.TestCheckResourceAttrSet(dataSourceName, "description"),
resource.TestCheckResourceAttrSet(dataSourceName, "type"),
resource.TestCheckResourceAttr(dataSourceName, "permissions.#", "1"),
resource.TestCheckResourceAttr(dataSourceName, "permissions.0.actions.#", "37"),
resource.TestCheckResourceAttr(dataSourceName, "permissions.0.actions.#", "38"),
resource.TestCheckResourceAttr(dataSourceName, "permissions.0.actions.0", "Microsoft.Authorization/*/read"),
resource.TestCheckResourceAttr(dataSourceName, "permissions.0.actions.15", "Microsoft.Network/networkSecurityGroups/join/action"),
resource.TestCheckResourceAttr(dataSourceName, "permissions.0.not_actions.#", "0"),
Expand Down
42 changes: 42 additions & 0 deletions azurerm/helpers/azure/firewall.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,42 @@
package azure

import (
"fmt"

"github.com/Azure/azure-sdk-for-go/services/network/mgmt/2018-04-01/network"
)

// The API requires InternalPublicIPAddress to be set when for a CreateOrUpdate
// operation, but Get operations return the property as PublicIPAddress
// so we need to go through and copy the value to the correct property.
func FirewallFixIPConfiguration(input *[]network.AzureFirewallIPConfiguration) (*[]network.AzureFirewallIPConfiguration, error) {
if input == nil {
return nil, fmt.Errorf("`input` was nil")
}

results := make([]network.AzureFirewallIPConfiguration, 0)
for _, config := range *input {
if config.Subnet == nil || config.Subnet.ID == nil {
return nil, fmt.Errorf("`config.Subnet.ID` was nil")
}

if config.PublicIPAddress == nil || config.PublicIPAddress.ID == nil {
return nil, fmt.Errorf("`config.PublicIPAddress.ID` was nil")
}

result := network.AzureFirewallIPConfiguration{
Name: config.Name,
AzureFirewallIPConfigurationPropertiesFormat: &network.AzureFirewallIPConfigurationPropertiesFormat{
Subnet: &network.SubResource{
ID: config.Subnet.ID,
},
InternalPublicIPAddress: &network.SubResource{
ID: config.PublicIPAddress.ID,
},
},
}
results = append(results, result)
}

return &results, nil
}
105 changes: 0 additions & 105 deletions azurerm/import_arm_public_ip_test.go

This file was deleted.

32 changes: 0 additions & 32 deletions azurerm/import_arm_virtual_network_gateway_connection_test.go

This file was deleted.

3 changes: 3 additions & 0 deletions azurerm/provider.go
Original file line number Diff line number Diff line change
Expand Up @@ -141,6 +141,8 @@ func Provider() terraform.ResourceProvider {
"azurerm_automation_schedule": resourceArmAutomationSchedule(),
"azurerm_autoscale_setting": resourceArmAutoScaleSetting(),
"azurerm_availability_set": resourceArmAvailabilitySet(),
"azurerm_firewall": resourceArmFirewall(),
"azurerm_firewall_network_rule_collection": resourceArmFirewallNetworkRuleCollection(),
"azurerm_cdn_endpoint": resourceArmCdnEndpoint(),
"azurerm_cdn_profile": resourceArmCdnProfile(),
"azurerm_container_registry": resourceArmContainerRegistry(),
Expand Down Expand Up @@ -204,6 +206,7 @@ func Provider() terraform.ResourceProvider {
"azurerm_mysql_database": resourceArmMySqlDatabase(),
"azurerm_mysql_firewall_rule": resourceArmMySqlFirewallRule(),
"azurerm_mysql_server": resourceArmMySqlServer(),
"azurerm_mysql_virtual_network_rule": resourceArmMySqlVirtualNetworkRule(),
"azurerm_network_interface": resourceArmNetworkInterface(),
"azurerm_network_security_group": resourceArmNetworkSecurityGroup(),
"azurerm_network_security_rule": resourceArmNetworkSecurityRule(),
Expand Down
Loading