-
Notifications
You must be signed in to change notification settings - Fork 9.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
r/aws_redshiftserverless_workgroup: allow require_ssl
, use_fips_ssl
config parameters
#33916
Conversation
Community NoteVoting for Prioritization
For Submitters
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM 🚀.
This functionality has been released in v5.21.0 of the Terraform AWS Provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template. Thank you! |
I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Description
Allows SSL-related
config_parameters
to be specified in Terraform. Adding these can prevent persistent differences when AWS default values are returned in theconfig_parameters
array.Longer term the
config_parameters
argument could be refactored to suppress differences when keys with default values are returned from the read operation. The complexity involved with this approach warrants a deeper dive into the API. This PR aims simply to enable explicit configuration of these new keys to unblock existing configurations.Before:
After:
Relations
Closes #33692
References
Output from Acceptance Testing