-
-
Notifications
You must be signed in to change notification settings - Fork 573
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat!: Terraform MSV increased to 1.0, consolidate security group rules under one generic resource, add support for managed master password #335
Conversation
The fix here is a version bump so I will catch that up with other |
we should wait for hashicorp/terraform-provider-aws#28538 to see what that implementation is before merging this, but in the meantime I'll prep the other changes |
bd85174
to
9ac6703
Compare
4e15012
to
8b2a6c4
Compare
Since this is a breaking change anyways, maybe also good to set the default password length to something like 20 characters. 10 characters is not that long and since not using special characters it makes it fairly weak. |
I am waiting for hashicorp/terraform-provider-aws#28538 which deals with the password management so we'll see what that API looks like and make changes as necessary here. Ideally, there are no more passwords generated/managed by this module and therefore outside of the Terraform state |
81a0ba4
to
ed1083a
Compare
ed1083a
to
f697c2d
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Zero comments! Looks perfect right away :)
|
||
on: | ||
schedule: | ||
- cron: '50 1 * * *' |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Not related to the PR, but I would like to know how to avoid GitHub token rate limit throttling since we have the same cron expression in all repositories, and every night I receive a lot of emails when this workflow fails.
There is an open issue already, but it doesn't seem to be moving anywhere - dessant/lock-threads#35
## [8.0.0](v7.7.1...v8.0.0) (2023-04-10) ### ⚠ BREAKING CHANGES * Terraform MSV increased to 1.0, consolidate security group rules under one generic resource, add support for managed master password (#335) ### Features * Terraform MSV increased to 1.0, consolidate security group rules under one generic resource, add support for managed master password ([#335](#335)) ([e054f77](e054f77))
This PR is included in version 8.0.0 🎉 |
@antonbabenko What is the proper way to migrate to v8 if you had |
@nikolay Probably remove that random password resource from Terraform state ( @bryantbiggs Should we upgrade this process in the Upgrade Guide for version 8.0? I suspect this will be a frequent question. |
Just simply changing to use |
Will |
It is documented in the AWS documentation - Aurora does automatically rotate the password when it manages the master password The master password is not intended for applications - the master password should be treated like the root user of an AWS account. You use it for only certain scenarios, but you should create custom users and groups with the appropriate access permissions which are used by users and/or applications. You can also look at providing access using IAM auth - either directly through Aurora or through something like RDS Proxy |
That's very helpful advice - thanks @bryantbiggs! |
@antonbabenko and/or @bryantbiggs When I removed |
thats the point of the feature and why it was designed - when using |
@bryantbiggs I was expecting the ARN to the secret. I use the PostgreSQL provider to create app-specific users, i.e. we still need a way to authenticate as root in order to create the limited users. |
that link didn't seem to work as expected, but its on terraform-aws-rds-aurora/outputs.tf Lines 72 to 75 in 4380f14
|
I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems related to this change, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further. |
Description
snapshot_identifier
andglobal_cluster_identifier
which makes this feature challenging to support; which it has already been challenging to support in the past and often catching users off guard. Instead, the module now defaults tonull
for both of these values and puts the control back in user's hands if they wish to set a value for one of these arguments.create_db_subnet_group
has changed fromtrue
tofalse
- typically, a common/shared DB subnet group is utilized since there are no real tangible benefits to creating a new one for each DB clusterallowed_security_groups
,allowed_cidr_blocks
, andsecurity_group_egress_rules
have been removed and replaced with a more genericsecurity_group_rules
variable which supports both ingress and egress rules to/from all supported resources/destinations (e.g. security groups, CIDR blocks, prefix lists, etc.)lock.yml
workflow to automatically lock issues and PRs after 30 days. Theres a lot "Me too" or "I have this issue, when will this get fixed" on really old/stale issues and in order to properly triage, users need to supply their configurations. This workflow is pulled from the AWS provider's repo to force users to fill out a proper issue ticket and keep chatter out of merged PRs or old issuescidrsubnet()
functionSee UPGRADE-8.0.md for full details
Motivation and Context
Breaking Changes
How Has This Been Tested?
examples/*
to demonstrate and validate my change(s)examples/*
projectspre-commit run -a
on my pull request