-
Notifications
You must be signed in to change notification settings - Fork 9.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Docs]: Missed information about TLSv1.3 #37502
Comments
Community NoteVoting for Prioritization
Volunteering to Work on This Issue
|
For reference, both the API reference and AWS Go SDK v2 code seems to have only SSLv3, TLSv1, TLSv1.1, and TLSv1.2 listed. However, the field is supposed to be for the minimum SSL/TLS protocol which is also known as the security policy described in Supported protocols and ciphers between viewers and CloudFront. For example, the TLSv1.2 security policies all support TLSv1.3 in the table on this page. Maybe it's just to make sense of the information and document it properly to avoid confusion. |
So there are two sub-paths along the request path that HTTPS is configurable:
Illustration for good measure: I will update the doc to provide similar description as OriginSslProtocols which includes a link to the Developer Guide. Hopefully this clarifies the argument usage a bit. Nonetheless it's interesting that CloudFront doesn't support TLS1.3 for all scenarios by now. If I have time, I'll open a support case to inquire as I am now curious. |
Warning This issue has been closed, meaning that any additional comments are hard for our team to see. Please assume that the maintainers will not see them. Ongoing conversations amongst community members are welcome, however, the issue will be locked after 30 days. Moving conversations to another venue, such as the AWS Provider forum, is recommended. If you have additional concerns, please open a new issue, referencing this one where needed. |
This functionality has been released in v5.50.0 of the Terraform AWS Provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template. Thank you! |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Documentation Link
https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudfront_distribution#origin_ssl_protocols
Description
Amazon lists

TLSv1.3
as supported protocol: https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/secure-connections-supported-viewer-protocols-ciphers.htmlBut in the document it is not listed:

References
No response
Would you like to implement a fix?
None
The text was updated successfully, but these errors were encountered: