Closed esteban1983cl closed 2 months ago
@esteban1983cl currently, the provider doesn't allow one to specify a custom CA certificate.
That said, importing a certificate to the system could work.
You can try running something like mysql with correct ssl-mode (mysql --ssl-mode=VERIFY_IDENTITY -h host -u user -p
) with possibly more parameters for debugging and I believe its behavior should match whatever go client is doing.
For a quick fix on a secure network (like from inside AWS), you can even specify tls = "skip-verify" in mysql provider configuration.
@esteban1983cl just running thru the issues and I believe you can specify the certificate now. Just see the docs at https://registry.terraform.io/providers/petoju/mysql/latest/docs
Hi there,
Please help with this issue, unable to create user when use AWS RDS MySQL encrypted instance.
Terraform Version
Same issue with using linux version.
Affected Resource(s)
Please list the resources as a list, for example:
Terraform Configuration Files
Debug Output
I'm sorry, terraform doesn't enable logs https://gist.github.com/esteban1983cl/60d630e7e5ecba5d05f3083402ae928b
Panic Output
N/A
Expected Behavior
Provider creates the user
Actual Behavior
Error about certificate
Error: failed to connect to MySQL: could not connect to server: x509: “Amazon RDS us-east-1 2019 CA” certificate is not trusted
Steps to Reproduce
Please list the steps required to reproduce the issue, for example:
terraform plan
terraform apply
Important Factoids
N/A
References
N/A