Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

(rds): Support kerberos authentication on RDS clusters #28050

Closed
1 of 2 tasks
tl24 opened this issue Nov 17, 2023 · 2 comments · Fixed by #28559
Closed
1 of 2 tasks

(rds): Support kerberos authentication on RDS clusters #28050

tl24 opened this issue Nov 17, 2023 · 2 comments · Fixed by #28559
Labels
@aws-cdk/aws-rds Related to Amazon Relational Database effort/medium Medium work item – several days of effort feature-request A feature should be added or improved. p2

Comments

@tl24
Copy link

tl24 commented Nov 17, 2023

Describe the feature

Support kerberos (domain and domainIamRoleName arguments) on RDS clusters for authentication. This is supported on RDS single instances but not clusters. These arguments are exposed by CloudFormation.

Use Case

So that I can configure my RDS cluster to support kerberos authentication and not have to maintain separate passwords in RDS.

Proposed Solution

Add domain and domainIamRoleName props to RDS DatabaseClusterProps and pass those to CfnDatabaseCluster

Other Information

No response

Acknowledgements

  • I may be able to implement this feature request
  • This feature might incur a breaking change

CDK version used

2.110.0

Environment details (OS name and version, etc.)

Ubuntu 20.04

@tl24 tl24 added feature-request A feature should be added or improved. needs-triage This issue or PR still needs to be triaged. labels Nov 17, 2023
@github-actions github-actions bot added the @aws-cdk/aws-rds Related to Amazon Relational Database label Nov 17, 2023
@pahud
Copy link
Contributor

pahud commented Nov 17, 2023

Thank you for the feature request and we are looking forward to your pull request.

@pahud pahud added p2 effort/medium Medium work item – several days of effort and removed needs-triage This issue or PR still needs to be triaged. labels Nov 17, 2023
@mergify mergify bot closed this as completed in #28559 Jan 24, 2024
mergify bot pushed a commit that referenced this issue Jan 24, 2024
#28559)

I have added the arguments domain and domainRole to support Kerberos authentication for the Aurora Database cluster. The specifications for these arguments are the same as the existing [domain](https://github.com/aws/aws-cdk/blob/main/packages/aws-cdk-lib/aws-rds/lib/instance.ts#L625) and [domainRole](https://github.com/aws/aws-cdk/blob/main/packages/aws-cdk-lib/aws-rds/lib/instance.ts#L633) in the [Instance](https://github.com/aws/aws-cdk/tree/main/packages/aws-cdk-lib/aws-rds#kerberos-authentication).

```ts
declare const vpc: ec2.Vpc
declare const iamRole: iam.IRole
new rds.DatabaseCluster(this, 'Database', {
  engine: rds.DatabaseClusterEngine.auroraMysql({ version: rds.AuroraMysqlEngineVersion.VER_3_05_1 }),
  writer: rds.ClusterInstance.provisioned('Instance', {
    instanceType: ec2.InstanceType.of(ec2.InstanceClass.BURSTABLE3, ec2.InstanceSize.MEDIUM),
  }),
  vpc,
  domain: 'd-????????', // added
  domainRole: iamRole, // added
});
```

Closes #28050.

----

*By submitting this pull request, I confirm that my contribution is made under the terms of the Apache-2.0 license*
Copy link

⚠️COMMENT VISIBILITY WARNING⚠️

Comments on closed issues are hard for our team to see.
If you need more assistance, please either tag a team member or open a new issue that references this one.
If you wish to keep having a conversation with other community members under this issue feel free to do so.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
@aws-cdk/aws-rds Related to Amazon Relational Database effort/medium Medium work item – several days of effort feature-request A feature should be added or improved. p2
Projects
None yet
Development

Successfully merging a pull request may close this issue.

2 participants