-
-
Notifications
You must be signed in to change notification settings - Fork 602
feat: Ephemeral password support #513
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
feat: Ephemeral password support #513
Conversation
|
see #509 (comment) |
|
Can I ask why this is considered a breaking change for the module? The parameter has been available for a while in the AWS provider and adding support for it in the module won't break any deployments that currently rely on either having the password managed by AWS or use |
|
its forcing users to upgrade to a new major version of the provider - plus, if you read what I linked, it will force users to use a quite new version of Terraform and also break support for OpenTofu (from what I am told) since OpenTofu does not support write-only arguments |
|
The write-only arguments are already present in the currently referenced version requirement of the provider: https://registry.terraform.io/providers/hashicorp/aws/5.89.0/docs/resources/rds_cluster Opentofu must therefore be able to somehow deal with them, I guess? Is there a timeline for when you plan to update the terraform version requirement? I'm primarily asking to evaluate whether a fork is worth the effort - I really want to get rid of secrets in the state ^^' |
|
This PR has been automatically marked as stale because it has been open 30 days |
|
This is exactly what I'm looking for. Thanks @artem-hatchenko for raising this. |
|
Hello @bryantbiggs Do you have a public link (milestones, roadmap,...) that show which PRs/features will be include in a future breaking change |
|
milestone added - it is not exhaustive; it just captures known open issues and PRs that would be candidates for that release |
Description
This update adds support for ephemeral master passwords (master_password_wo) in RDS/Aurora clusters.
With this option, the master password is write-only and never stored in the Terraform state.
Motivation
Since "manage_master_user_password" has annoying behavior with enabled rotation by default, and "master_password" stores the value in state, this solution provides an alternative.
How Has This Been Tested?
Tested with a few options:
Option 1
manage_master_user_password = false
master_password = false
master_password_wo = true
Result: Deploy successful and connection with "wo" password works
Option 2
manage_master_user_password = false
master_password = true
master_password_wo = true
Result: Conflicting configuration arguments (expected)
Option 3
manage_master_user_password = true
master_password = false
master_password_wo = true
Result: Conflicting configuration arguments (expected)
Usage
Generate a password via ephemeral, put result into Secret Manager, and retrieve version of the secret.
Pass necessary variables into module: