Skip to content
This repository was archived by the owner on Oct 23, 2025. It is now read-only.

Conversation

@nidhimanthale
Copy link

The changes provide Cloudformation support for Secrets Manager integration with Redshift clusters. With this new feature, customers can opt in to store their cluster's admin credentials in a service linked secret in Secrets Manager. It allows us to create/modify/restore Redshift clusters with Secrets Manager support using the Cloudformation template. The changes in this request allow us to use create-cluster, modify-cluster, restore-from-cluster-snapshot APIs for Redshift clusters when opting in to this feature.

We are adding a new boolean parameter "ManageMasterPassword" to allow customers to opt in to this feature and another parameter "MasterPasswordSecretKmsKeyId" allows customers to specify the key ID of the KMS key in the customer account which will be used to encrypt the cluster secret. These parameters can be used while setting CreateClusterRequest, ModifyClusterRequest and RestoreFromClusterSnapshotRequest. The response of these requests will return the "MasterPasswordSecretArn" when the cluster is opted in to this feature.

protected boolean invalidCreateClusterRequest(ResourceModel model) {
return model.getClusterIdentifier() == null || model.getNodeType() == null
|| model.getMasterUsername() == null || model.getMasterUserPassword() == null;
|| model.getMasterUsername() == null;

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

if cx doesn't pass in ManageMasterPassword the request would still be invalid right, can we add the condition for all the scenarios here please? or tell me I'm wrong :)

nidhimanthale and others added 2 commits December 19, 2023 23:15
- Check if required parameters are provided - ClusterIdentifier, NodeType, MasterUsername
- Check if either MasterUserPassword is provided or ManageMasterPassword is true
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants