Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Allow multiple secrets for RDS Proxy #27833

Closed
cisnerosk opened this issue Feb 19, 2021 · 2 comments
Closed

Allow multiple secrets for RDS Proxy #27833

cisnerosk opened this issue Feb 19, 2021 · 2 comments
Labels
enhancement new new issue not yet triaged provider/aws

Comments

@cisnerosk
Copy link

Current Terraform Version

0.13.3

I did take a quick look at the Changelog for newer versions, and I didn't see where this is implemented in newer versions yet.

Use-cases

In the console you can add many secrets to the RDS proxy. Additionally the AWS CDK supports this, while trying to do this with Terraform it fails. It seems as though auth.secrets_arn can't take an array of values.

Attempted Solutions

N/A

Proposal

I'm not sure of how to fix this, although I suspect this block needs to be changed to support sets of hashes. I'm not familiar with Go, so this may be the wrong starting point.

References

aws/aws-cdk#9098

@ghost
Copy link

ghost commented Feb 19, 2021

This issue has been automatically migrated to hashicorp/terraform-provider-aws#17713 because it looks like an issue with that provider. If you believe this is not an issue with the provider, please reply to hashicorp/terraform-provider-aws#17713.

@ghost ghost closed this as completed Feb 19, 2021
@ghost
Copy link

ghost commented Mar 22, 2021

I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues.

If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further.

@ghost ghost locked as resolved and limited conversation to collaborators Mar 22, 2021
This issue was closed.
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
enhancement new new issue not yet triaged provider/aws
Projects
None yet
Development

No branches or pull requests

2 participants