-
Notifications
You must be signed in to change notification settings - Fork 66
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support RDS IAM authentication #106
Comments
The
will fail with error
|
Hi, Would someone be able to point me to / guide me? |
…sers Signed-off-by: cten <[email protected]>
This works for RDS IAM auth: apiVersion: postgresql.sql.crossplane.io/v1alpha1
kind: ProviderConfig
metadata:
name: default
spec:
defaultDatabase: example
sslMode: require
credentials:
source: PostgreSQLConnectionSecret
connectionSecretRef:
namespace: default
name: example-secret
---
apiVersion: postgresql.sql.crossplane.io/v1alpha1
kind: Role
metadata:
name: examplerole
annotations:
crossplane.io/external-name: "you_can_also_have_underscores_in_role_name"
spec:
forProvider:
privileges:
login: true
---
apiVersion: postgresql.sql.crossplane.io/v1alpha1
kind: Grant
metadata:
name: mainrole
spec:
forProvider:
memberOf: exampleuser
roleRef:
name: examplerole
---
apiVersion: postgresql.sql.crossplane.io/v1alpha1
kind: Grant
metadata:
name: iamrole
spec:
forProvider:
memberOf: rds_iam
roleRef:
name: examplerole |
Considering the last answer, it seems that this is solved. |
Hi,
It seems that currently RDS IAM authentication for mysql/postgresql users is not possible with the provider.
Here are the official docs: https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/UsingWithRDS.IAMDBAuth.DBAccounts.html
For mysql it is necessary to set
AWSAuthenticationPlugin
when creating the user.For postgresql the user must be granted the
rds_iam
role.This possible with the Terraform providers:
https://registry.terraform.io/providers/bangau1/mysql/latest/docs/resources/user
https://registry.terraform.io/providers/cyrilgdn/postgresql/latest/docs/resources/postgresql_grant_role
The text was updated successfully, but these errors were encountered: