Skip to content
This repository has been archived by the owner on Jan 12, 2021. It is now read-only.

Specify a custom TLS certificate #98

Open
Gloix opened this issue Oct 3, 2019 · 0 comments
Open

Specify a custom TLS certificate #98

Gloix opened this issue Oct 3, 2019 · 0 comments

Comments

@Gloix
Copy link

Gloix commented Oct 3, 2019

Since the RDS service from AWS allows the creation of databases allowing TLS connections with a certificate emitted by their own CA, it is required to specify a CA file to connect to a RDS instance (at least in AuroraDB, which I'm using).

Link to documentation on that matter: https://docs.aws.amazon.com/en_pv/AmazonRDS/latest/AuroraUserGuide/AuroraMySQL.Security.html

I noticed that the mysql plugin used by this provider allows that here

From what I understand, it would be necessary to either allow that certificate to be passed as an input variable to the provider block or register the CA in the machine running the apply command.

Here's the output of the apply command if TLS is not correctly set, while using the tls = true option:

Error: Could not connect to server: x509: certificate signed by unknown authority

  on mysql/mysql_user/main.tf line 24, in resource "mysql_user" "user":
  24: resource "mysql_user" "user" {
@Gloix Gloix mentioned this issue Oct 5, 2019
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant