-
Notifications
You must be signed in to change notification settings - Fork 52
Conversation
@sworisbreathing you authored the commit 004a620. It seemed to contain multiple changes, so can you review that this PR reverts only the relevant part? @mtesch-um as author of #97, could you also review this? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@sworisbreathing you authored the commit 004a620. It seemed to contain multiple changes, so can you review that this PR reverts only the relevant part?
@hoxu confirmed, this only reverts the md5 hashing of the username
@hoxu thanks for pulling this together! To prevent any regression here, I'd suggest adding tests to |
I still can't run the tests, but commit 3bfdd33 is a blind-coded attempt at adding a test for creation of a user with MD5-hashed password. @mtesch-um can you check how it looks like? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
lgtm.
Also suggest the following addition to the documentation (
|
Documentation added in commit 49aad90. Did you check that Can you review this one more time and resolve the conversations if you are satisfied? I'll |
I tested with Redshift and it seems
Creation of SHA256-hashed Redshift passwords is poorly documented in AWS documentation, but this Stack Overflow answer has instructions: https://stackoverflow.com/questions/73489343/creating-a-redshift-user-with-a-sha256-password However, I didn't test logging in with a SHA256-hashed password, because apparently |
One more change, squash baee2bd. I removed mention of MD5 and SHA256 as well as |
baee2bd
to
8e171a4
Compare
I did Could someone with write access, like @robertomczak, @rg00d, @szemek or @winglot review and approve this so that the test workflow can be executed? |
8e171a4
to
f672031
Compare
Commit 004a620 Pass the password as-is to Redshift, and let it figure out whether the password is already hashed or needs to be hashed. Allow providing passwords as hashed instead of only plaintext.
623b8c7
to
fb930ce
Compare
@hoxu thanks [again] for taking the initiative to fix this!!! |
@mtesch-um Thanks to you for helping on every step along the way :) |
This partially reverts commit 004a620, that added MD5 hashing of all passwords on the provider side.
Now the passwords are again passed to Redshift as-is.
This allows Redshift to figure out whether the password is already hashed or needs to be hashed.
As a result, user passwords can be passed as hashed in the Terraform sources.
Unfortunately I could not run the acceptance tests against a Redshift cluster. Could someone help with the testing?
Fixes #97. Closes #90 and #96.