Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: add iam_role argument to aws-aurora, aws-aurora-postgres, aws-aurora-mysql #624

Merged
merged 2 commits into from
Aug 21, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 1 addition & 0 deletions aws-aurora-mysql/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -16,6 +16,7 @@ module "aurora" {
db_deletion_protection = var.db_deletion_protection
rds_cluster_parameters = var.rds_cluster_parameters
iam_database_authentication_enabled = var.iam_database_authentication_enabled
iam_roles = var.iam_roles
jakeyheath marked this conversation as resolved.
Show resolved Hide resolved
performance_insights_enabled = var.performance_insights_enabled
enabled_cloudwatch_logs_exports = ["audit", "error", "general", "slowquery"]
ca_cert_identifier = var.ca_cert_identifier
Expand Down
6 changes: 6 additions & 0 deletions aws-aurora-mysql/variables.tf
Original file line number Diff line number Diff line change
Expand Up @@ -164,6 +164,12 @@ variable "iam_database_authentication_enabled" {
default = false
}

variable "iam_roles" {
type = list(string)
description = "A list of IAM roles to associate with the RDS cluster."
default = []
}

variable "db_deletion_protection" {
type = string
default = false
Expand Down
1 change: 1 addition & 0 deletions aws-aurora-postgres/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -22,6 +22,7 @@ module "aurora" {
db_parameters = var.db_parameters
rds_cluster_parameters = var.rds_cluster_parameters
iam_database_authentication_enabled = var.iam_database_authentication_enabled
iam_roles = var.iam_roles
performance_insights_enabled = var.performance_insights_enabled
enabled_cloudwatch_logs_exports = ["postgresql"]
ca_cert_identifier = var.ca_cert_identifier
Expand Down
6 changes: 6 additions & 0 deletions aws-aurora-postgres/variables.tf
Original file line number Diff line number Diff line change
Expand Up @@ -125,6 +125,12 @@ variable "iam_database_authentication_enabled" {
default = false
}

variable "iam_roles" {
type = list(string)
description = "A list of IAM roles to associate with the RDS cluster."
default = []
}

variable "ca_cert_identifier" {
type = string
description = "Identifier for the certificate authority."
Expand Down
1 change: 1 addition & 0 deletions aws-aurora/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -62,6 +62,7 @@ resource "aws_rds_cluster" "db" {
db_subnet_group_name = var.database_subnet_group
storage_encrypted = true
iam_database_authentication_enabled = var.iam_database_authentication_enabled
iam_roles = var.iam_roles
backup_retention_period = 28
snapshot_identifier = var.snapshot_identifier
final_snapshot_identifier = "${local.name}-snapshot"
Expand Down
6 changes: 6 additions & 0 deletions aws-aurora/variables.tf
Original file line number Diff line number Diff line change
Expand Up @@ -118,6 +118,12 @@ variable "iam_database_authentication_enabled" {
default = true
}

variable "iam_roles" {
type = list(string)
description = "A list of IAM roles to associate with the RDS cluster."
default = []
}

variable "enabled_cloudwatch_logs_exports" {
type = list(any)
default = []
Expand Down
Loading