-
Notifications
You must be signed in to change notification settings - Fork 9.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
r/aws_elasticache_replication_group: add auth_token_update_strategy argument #34460
Conversation
Community NoteVoting for Prioritization
For Submitters
|
…rgument This optional argument will have a default value of `ROTATE`, as this was the previously hardcoded value sent during modify requests in which the `auth_token` was changed. Practitioners will now have the ability to explicitly use the `SET` and `DELETE` strategies as well.
933fcdf
to
4ef3c76
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM 🚀.
% make testacc TESTARGS='-run=TestAccElastiCacheReplicationGroup_authToken' PKG=elasticache
==> Checking that code complies with gofmt requirements...
TF_ACC=1 go test ./internal/service/elasticache/... -v -count 1 -parallel 20 -run=TestAccElastiCacheReplicationGroup_authToken -timeout 360m
=== RUN TestAccElastiCacheReplicationGroup_authToken
=== PAUSE TestAccElastiCacheReplicationGroup_authToken
=== CONT TestAccElastiCacheReplicationGroup_authToken
--- PASS: TestAccElastiCacheReplicationGroup_authToken (2039.51s)
PASS
ok github.com/hashicorp/terraform-provider-aws/internal/service/elasticache 2046.126s
This functionality has been released in v5.27.0 of the Terraform AWS Provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template. Thank you! |
It looks like this invalidates the description of auth_token_update_strategy which says
Because even if transit_encryption_enabled is set to false, auth_token_update_strategy is being set. |
this is indeed broken.. |
Thank you for the suggestion. The original intent was to indicate that when setting the For now we can remove this sentence from the documentation to avoid any confusion. Once we remove the default value in |
Documentation has been updated in #34633. Thanks again! |
I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Description
This optional argument will have a default value of
ROTATE
, as this was the previously hardcoded value sent during modify requests in which theauth_token
was changed. Practitioners will now have the ability to explicitly use theSET
andDELETE
strategies as well. A future major version may remove the defaultROTATE
value once backwards compatibility can safely be broken.Also adds an example to the replication group documentation which explicitly indicates that using the
ROTATE
update strategy when adding an initialauth_token
to a group with no authentication will result in both the new password and no password being supported. This can be mitigated by using theSET
strategy instead.Relations
Closes #11524
Closes #33439
Closes #31710
References
Output from Acceptance Testing
Failure is unrelated to this change.