-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
azurerm_mariadb_server
: Add support for ssl_minimal_tls_version_enforced
#20556
Conversation
…forced` ``` $ TF_ACC=1 go test -v ./internal/services/mariadb -timeout=1000m -run='TestAccMariaDbServer_basicTenTwo' === RUN TestAccMariaDbServer_basicTenTwo === PAUSE TestAccMariaDbServer_basicTenTwo === CONT TestAccMariaDbServer_basicTenTwo --- PASS: TestAccMariaDbServer_basicTenTwo (296.33s) PASS ok github.com/hashicorp/terraform-provider-azurerm/internal/services/mariadb 297.574s ``` Fixes hashicorp#7899
azurerm_mariadb_server
: Add support for `ssl_minimal_tls_version_en…azurerm_mariadb_server
: Add support for ssl_minimal_tls_version_enforced
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for this @favoretti, one minor typo in the docs and also a concern regarding the default value for the property. Once those are resolved this should be good to go though!
@@ -76,6 +77,8 @@ The following arguments are supported: | |||
|
|||
* `ssl_enforcement_enabled` - (Required) Specifies if SSL should be enforced on connections. Possible values are `true` and `false`. | |||
|
|||
* `ssl_minimal_tls_version_enforced` - (Optional) The minimum TLS version to support on the sever. Possible values are `TLSEnforcementDisabled`, `TLS1_0`, `TLS1_1`, and `TLS1_2`. Defaults to `TLS1_2`. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
* `ssl_minimal_tls_version_enforced` - (Optional) The minimum TLS version to support on the sever. Possible values are `TLSEnforcementDisabled`, `TLS1_0`, `TLS1_1`, and `TLS1_2`. Defaults to `TLS1_2`. | |
* `ssl_minimal_tls_version_enforced` - (Optional) The minimum TLS version to support on the server. Possible values are `TLSEnforcementDisabled`, `TLS1_0`, `TLS1_1`, and `TLS1_2`. Defaults to `TLS1_2`. |
"ssl_minimal_tls_version_enforced": { | ||
Type: pluginsdk.TypeString, | ||
Optional: true, | ||
Default: string(servers.MinimalTlsVersionEnumTLSOneTwo), | ||
ValidateFunc: validation.StringInSlice(servers.PossibleValuesForMinimalTlsVersionEnum(), false), | ||
}, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Whilst I agree from a security perspective that this should be defaulted to TLS1_2
, it looks like the API is defaulting this to TLSEnforcementDisabled
. Perhaps this should be Computed
for now and default to TLS1_2
in 4.x?
@favoretti any updates? |
Oh, I’m so sorry, I totally forgot about this one. Will pick it up later
today.
…On Tue, 4 Apr 2023 at 12:11, stephybun ***@***.***> wrote:
@favoretti <https://github.com/favoretti> any updates?
—
Reply to this email directly, view it on GitHub
<#20556 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AAGERNUCVYALWN5HDAYTL43W7PXT5ANCNFSM6AAAAAAVBBFWDE>
.
You are receiving this because you were mentioned.Message ID:
***@***.***>
|
Ah, it seems #20782 got merged ahead of slowpokle me :) Closing this one then. |
Fixes #7899