You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Jan 12, 2021. It is now read-only.
Since the RDS service from AWS allows the creation of databases allowing TLS connections with a certificate emitted by their own CA, it is required to specify a CA file to connect to a RDS instance (at least in AuroraDB, which I'm using).
I noticed that the mysql plugin used by this provider allows that here
From what I understand, it would be necessary to either allow that certificate to be passed as an input variable to the provider block or register the CA in the machine running the apply command.
Here's the output of the apply command if TLS is not correctly set, while using the tls = true option:
Error: Could not connect to server: x509: certificate signed by unknown authority
on mysql/mysql_user/main.tf line 24, in resource "mysql_user" "user":
24: resource "mysql_user" "user" {
The text was updated successfully, but these errors were encountered:
Since the RDS service from AWS allows the creation of databases allowing TLS connections with a certificate emitted by their own CA, it is required to specify a CA file to connect to a RDS instance (at least in AuroraDB, which I'm using).
Link to documentation on that matter: https://docs.aws.amazon.com/en_pv/AmazonRDS/latest/AuroraUserGuide/AuroraMySQL.Security.html
I noticed that the mysql plugin used by this provider allows that here
From what I understand, it would be necessary to either allow that certificate to be passed as an input variable to the provider block or register the CA in the machine running the
apply
command.Here's the output of the
apply
command if TLS is not correctly set, while using thetls = true
option:The text was updated successfully, but these errors were encountered: