You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|[aws_iam_policy_document.assume_role](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
92
91
|[aws_iam_policy_document.this](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
92
+
|[aws_partition.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/partition)| data source |
93
93
|[aws_region.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/region)| data source |
94
94
95
95
## Inputs
96
96
97
97
| Name | Description | Type | Default | Required |
| <aname="input_auth_scheme"></a> [auth\_scheme](#input\_auth\_scheme)|The type of authentication that the proxy uses for connections from the proxy to the underlying database. One of `SECRETS`|`string`|`"SECRETS"`| no |
99
+
| <aname="input_auth"></a> [auth](#input\_auth)|Configuration block(s) with authorization mechanisms to connect to the associated instances or clusters |`any`|`{}`| no |
100
100
| <aname="input_connection_borrow_timeout"></a> [connection\_borrow\_timeout](#input\_connection\_borrow\_timeout)| The number of seconds for a proxy to wait for a connection to become available in the connection pool |`number`|`null`| no |
101
+
| <aname="input_create"></a> [create](#input\_create)| Whether cluster should be created (affects nearly all resources) |`bool`|`true`| no |
101
102
| <aname="input_create_iam_policy"></a> [create\_iam\_policy](#input\_create\_iam\_policy)| Determines whether an IAM policy is created |`bool`|`true`| no |
102
103
| <aname="input_create_iam_role"></a> [create\_iam\_role](#input\_create\_iam\_role)| Determines whether an IAM role is created |`bool`|`true`| no |
103
-
| <aname="input_create_proxy"></a> [create\_proxy](#input\_create\_proxy)| Determines whether a proxy and its resources will be created |`bool`|`true`| no |
104
104
| <aname="input_db_cluster_identifier"></a> [db\_cluster\_identifier](#input\_db\_cluster\_identifier)| DB cluster identifier |`string`|`""`| no |
105
105
| <aname="input_db_instance_identifier"></a> [db\_instance\_identifier](#input\_db\_instance\_identifier)| DB instance identifier |`string`|`""`| no |
106
-
| <aname="input_db_proxy_endpoints"></a> [db\_proxy\_endpoints](#input\_db\_proxy\_endpoints)| Map of DB proxy endpoints to create and their attributes (see `aws_db_proxy_endpoint`) |`any`|`{}`| no |
107
106
| <aname="input_debug_logging"></a> [debug\_logging](#input\_debug\_logging)| Whether the proxy includes detailed information about SQL statements in its logs |`bool`|`false`| no |
107
+
| <aname="input_endpoints"></a> [endpoints](#input\_endpoints)| Map of DB proxy endpoints to create and their attributes (see `aws_db_proxy_endpoint`) |`any`|`{}`| no |
108
108
| <aname="input_engine_family"></a> [engine\_family](#input\_engine\_family)| The kind of database engine that the proxy will connect to. Valid values are `MYSQL` or `POSTGRESQL`|`string`|`""`| no |
109
-
| <aname="input_iam_auth"></a> [iam\_auth](#input\_iam\_auth)| Whether to require or disallow AWS Identity and Access Management (IAM) authentication for connections to the proxy. One of `DISABLED`, `REQUIRED`|`string`|`"REQUIRED"`| no |
110
109
| <aname="input_iam_policy_name"></a> [iam\_policy\_name](#input\_iam\_policy\_name)| The name of the role policy. If omitted, Terraform will assign a random, unique name |`string`|`""`| no |
111
110
| <aname="input_iam_role_description"></a> [iam\_role\_description](#input\_iam\_role\_description)| The description of the role |`string`|`""`| no |
112
111
| <aname="input_iam_role_force_detach_policies"></a> [iam\_role\_force\_detach\_policies](#input\_iam\_role\_force\_detach\_policies)| Specifies to force detaching any policies the role has before destroying it |`bool`|`true`| no |
@@ -117,6 +116,7 @@ No modules.
117
116
| <aname="input_iam_role_tags"></a> [iam\_role\_tags](#input\_iam\_role\_tags)| A map of tags to apply to the IAM role |`map(string)`|`{}`| no |
118
117
| <aname="input_idle_client_timeout"></a> [idle\_client\_timeout](#input\_idle\_client\_timeout)| The number of seconds that a connection to the proxy can be inactive before the proxy disconnects it |`number`|`1800`| no |
119
118
| <aname="input_init_query"></a> [init\_query](#input\_init\_query)| One or more SQL statements for the proxy to run when opening each new database connection |`string`|`""`| no |
119
+
| <aname="input_kms_key_arns"></a> [kms\_key\_arns](#input\_kms\_key\_arns)| List of KMS Key ARNs to allow access to decrypt SecretsManager secrets |`list(string)`|`[]`| no |
120
120
| <aname="input_log_group_kms_key_id"></a> [log\_group\_kms\_key\_id](#input\_log\_group\_kms\_key\_id)| The ARN of the KMS Key to use when encrypting log data |`string`|`null`| no |
121
121
| <aname="input_log_group_retention_in_days"></a> [log\_group\_retention\_in\_days](#input\_log\_group\_retention\_in\_days)| Specifies the number of days you want to retain log events in the log group |`number`|`30`| no |
122
122
| <aname="input_log_group_tags"></a> [log\_group\_tags](#input\_log\_group\_tags)| A map of tags to apply to the CloudWatch log group |`map(string)`|`{}`| no |
@@ -127,11 +127,10 @@ No modules.
127
127
| <aname="input_proxy_tags"></a> [proxy\_tags](#input\_proxy\_tags)| A map of tags to apply to the RDS Proxy |`map(string)`|`{}`| no |
128
128
| <aname="input_require_tls"></a> [require\_tls](#input\_require\_tls)| A Boolean parameter that specifies whether Transport Layer Security (TLS) encryption is required for connections to the proxy |`bool`|`true`| no |
129
129
| <aname="input_role_arn"></a> [role\_arn](#input\_role\_arn)| The Amazon Resource Name (ARN) of the IAM role that the proxy uses to access secrets in AWS Secrets Manager |`string`|`""`| no |
130
-
| <aname="input_secrets"></a> [secrets](#input\_secrets)| Map of secerets to be used by RDS Proxy for authentication to the database |`map(object({ arn = string, description = string, kms_key_id = string }))`|`{}`| no |
131
130
| <aname="input_session_pinning_filters"></a> [session\_pinning\_filters](#input\_session\_pinning\_filters)| Each item in the list represents a class of SQL operations that normally cause all later statements in a session using a proxy to be pinned to the same underlying database connection |`list(string)`|`[]`| no |
132
-
| <aname="input_tags"></a> [tags](#input\_tags)| A map of tags to use on all resources |`map(string)`|`{}`| no |
133
-
| <aname="input_target_db_cluster"></a> [target\_db\_cluster](#input\_target\_db\_cluster)| Determines whether DB cluster is targetted by proxy |`bool`|`false`| no |
134
-
| <aname="input_target_db_instance"></a> [target\_db\_instance](#input\_target\_db\_instance)| Determines whether DB instance is targetted by proxy |`bool`|`false`| no |
131
+
| <aname="input_tags"></a> [tags](#input\_tags)| A map of tags to add to all resources |`map(string)`|`{}`| no |
132
+
| <aname="input_target_db_cluster"></a> [target\_db\_cluster](#input\_target\_db\_cluster)| Determines whether DB cluster is targeted by proxy |`bool`|`false`| no |
133
+
| <aname="input_target_db_instance"></a> [target\_db\_instance](#input\_target\_db\_instance)| Determines whether DB instance is targeted by proxy |`bool`|`false`| no |
135
134
| <aname="input_use_policy_name_prefix"></a> [use\_policy\_name\_prefix](#input\_use\_policy\_name\_prefix)| Whether to use unique name beginning with the specified `iam_policy_name`|`bool`|`false`| no |
136
135
| <aname="input_use_role_name_prefix"></a> [use\_role\_name\_prefix](#input\_use\_role\_name\_prefix)| Whether to use unique name beginning with the specified `iam_role_name`|`bool`|`false`| no |
137
136
| <aname="input_vpc_security_group_ids"></a> [vpc\_security\_group\_ids](#input\_vpc\_security\_group\_ids)| One or more VPC security group IDs to associate with the new proxy |`list(string)`|`[]`| no |
If you have any questions regarding this upgrade process, please consult the `examples` directory.
4
+
If you find a bug, please open an issue with supporting configuration to reproduce.
5
+
6
+
## List of backwards incompatible changes
7
+
8
+
- Minimum supported Terraform version is now 1.0
9
+
- Minimum supported AWS provider version is now 5.0
10
+
- The manner in which authentication is configured has changed - previously auth settings were provided under `secrets` in conjunction with `auth_scheme` and `iam_auth` variables. Now, auth settings are provided under the `auth` variable for multiple auth entries.
11
+
12
+
### Variable and output changes
13
+
14
+
1. Removed variables:
15
+
16
+
-`auth_scheme` is now set under the `auth` variable for a given auth entry
17
+
-`iam_auth` is now set under the `auth` variable for a given auth entry
18
+
19
+
2. Renamed variables:
20
+
21
+
-`create_proxy` -> `create`
22
+
-`secrets` -> `auth`
23
+
-`db_proxy_endpoints` -> `endpoints`
24
+
25
+
3. Added variables:
26
+
27
+
-`kms_key_arns` - list of KMS key ARNs to use allowing permission to decrypt SecretsManager secrets
0 commit comments