This repository is an unofficial fork
The fork is mostly based on the official (now archived) repo. The provider also includes some extra changes and resolves almost all the reported issues.
I incorporated changes from winebarrel/terraform-provider-mysql, another fork from the official repo.
Just include the provider, example:
terraform {
required_providers {
mysql = {
source = "petoju/mysql"
version = "~> 3.0.72"
}
}
}
If you want to reproduce a build (to verify that my build conforms to the sources), download the provider of any version first and find the correct go version:
egrep -a -o 'go1[0-9\.]+' path_to_the_provider_binary
Clone the repository anywhere. Use goreleaser
to build the packages for all architectures:
goreleaser build --clean
Files in dist should match whatever is provided. If they don't, consider reading https://words.filippo.io/reproducing-go-binaries-byte-by-byte/ or open an issue here.
There is also experimental way to build everything in docker. I will try to use it every time, but I may skip it if it doesn't work. That should roughly match how I build the provider locally.
The provider supports AWS RDS IAM authentication using the aws_rds_iam_auth
parameter. You can configure AWS credentials and assume role settings using the aws_config
block.
Before using AWS RDS IAM authentication, ensure:
- RDS Instance: IAM authentication is enabled on your RDS instance
- Database User: Create user with IAM plugin:
CREATE USER 'username' IDENTIFIED WITH AWSAuthenticationPlugin AS 'RDS';
- IAM Permissions: Your AWS credentials have
rds-db:connect
permission - Network: Security groups allow connection from your Terraform execution environment
provider "mysql" {
endpoint = "your-rds-endpoint.amazonaws.com:3306"
username = "your-iam-user"
aws_config {
aws_rds_iam_auth = true
region = "us-east-1"
}
}
provider "mysql" {
endpoint = "your-rds-endpoint.amazonaws.com:3306"
username = "your-iam-user"
aws_config {
aws_rds_iam_auth = true
region = "us-east-1"
role_arn = "arn:aws:iam::123456789012:role/MyRDSRole"
}
}
For backward compatibility, the aws://
endpoint prefix is still supported:
provider "mysql" {
endpoint = "aws://your-rds-endpoint.amazonaws.com:3306"
username = "your-iam-user"
aws_config {
region = "us-east-1"
role_arn = "arn:aws:iam::123456789012:role/MyRDSRole"
}
}
region
- AWS region where the RDS instance is locatedprofile
- AWS profile to use from credentials fileaccess_key
- AWS access key (must be used with secret_key)secret_key
- AWS secret key (must be used with access_key)role_arn
- ARN of the IAM role to assume for RDS authenticationaws_rds_iam_auth
- Enable AWS RDS IAM authentication (default: false)use_rds_data_api
- Enable AWS RDS Data API for Aurora (default: false)cluster_arn
- ARN of the RDS Aurora cluster (required whenuse_rds_data_api = true
)secret_arn
- ARN of the Secrets Manager secret (required whenuse_rds_data_api = true
)
- When
aws_rds_iam_auth = true
is set in theaws_config
block, thepassword
parameter is ignored and auth token is generated automatically - The
role_arn
parameter allows you to assume a specific IAM role for RDS authentication, similar to the PostgreSQL provider functionality - The database user must be created with IAM authentication enabled:
CREATE USER 'username' IDENTIFIED WITH AWSAuthenticationPlugin AS 'RDS';
- IAM database authentication must be enabled on your RDS instance
- Your AWS credentials must have
rds-db:connect
permission for the specific database user and instance - TLS connection is required for AWS RDS IAM authentication (ensure your
tls
parameter is properly configured)
The provider supports AWS RDS Data API for Aurora connecting to databases using the use_rds_data_api
parameter. This allows you to access Aurora databases without managing VPC configurations or database connections.
Before using AWS RDS Data API, ensure:
- Data API enabled: You have an Aurora MySQL cluster with Data API enabled
- Secrets Manager: Database credentials are stored in AWS Secrets Manager
- IAM Permissions: Your AWS credentials have permissions to:
- Execute RDS Data API operations (
rds-data:ExecuteStatement
,rds-data:BatchExecuteStatement
, etc.) - Access the Secrets Manager secret (
secretsmanager:GetSecretValue
)
- Execute RDS Data API operations (
provider "mysql" {
# Optional: specify the database in conn_params
conn_params = {
database = "mydb"
}
aws_config {
use_rds_data_api = true
region = "us-east-1"
cluster_arn = "arn:aws:rds:us-east-1:123456789012:cluster:my-aurora-cluster"
secret_arn = "arn:aws:secretsmanager:us-east-1:123456789012:secret:my-db-secret"
}
}
use_rds_data_api
- Enable RDS Data API mode (mutually exclusive withaws_rds_iam_auth
)cluster_arn
- ARN of the RDS Aurora cluster (required whenuse_rds_data_api = true
)secret_arn
- ARN of the Secrets Manager secret containing database credentials (required whenuse_rds_data_api = true
)
- RDS Data API is only available for Aurora MySQL clusters
- The
password
parameter must be empty when using RDS Data API - The
use_rds_data_api
andaws_rds_iam_auth
options are mutually exclusive - Connection pool settings (
max_conn_lifetime_sec
,max_open_conns
,connect_retry_timeout_sec
) do not apply to RDS Data API as it uses stateless HTTP requests - Assume role is fully supported - the provider will use the assumed role credentials when accessing both RDS Data API and Secrets Manager
- Some MySQL features may have limitations when using the Data API
If you wish to work on the provider, you'll first need Go installed on your machine (version 1.17+ is required). You'll also need to correctly setup a GOPATH, as well as adding $GOPATH/bin
to your $PATH
.
To compile the provider, run make build
. This will build the provider and put the provider binary in the $GOPATH/bin
directory.
$ make bin
...
$ $GOPATH/bin/terraform-provider-mysql
...
- Docker environment
- mysql-client binary which can be installed on Mac with
brew install mysql-client@8.0
- Then add it to your path OR run
brew link mysql-client@8.0
- Then add it to your path OR run
In order to test the provider, you can simply run make test
.
$ make test
In order to run the full suite of Acceptance tests, run make testacc
.
Note: Acceptance tests create real resources, and often cost money to run.
$ make testacc
If you want to run the Acceptance tests on your own machine with a MySQL in Docker:
make acceptance
# or to test only one mysql version:
make testversion8.0