Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix: random password for default user and additional users will also follow password validation policy #443

Merged
merged 39 commits into from Mar 15, 2023

Conversation

ravisiddhu
Copy link
Contributor

This is to fix #431

fix: random password for default usser and additional users will also follow password validation policy

ravisiddhu and others added 30 commits December 12, 2022 13:23
…tead of the whole version name for postgres module.
…tead of the whole version name for postgres module.
…tead of the whole version name for postgres module.
…e there are some sensitive fields in google_sql_database_instance resource.
…le, since there are some sensitive fields in google_sql_database_instance resource."

This reverts commit 6c3aeef.
… for creating users with random password if password is set as null or an empty string.
@ravisiddhu ravisiddhu requested a review from a team as a code owner March 14, 2023 16:34
@apeabody
Copy link
Contributor

/gcbrun

2 similar comments
@bharathkkb
Copy link
Member

/gcbrun

@g-awmalik
Copy link
Contributor

/gcbrun

@g-awmalik
Copy link
Contributor

/gcbrun

@g-awmalik g-awmalik changed the title fix: random password for default usser and additional users will also follow password validation policy fix: random password for default user and additional users will also follow password validation policy Mar 15, 2023
@g-awmalik g-awmalik merged commit 0ceb0ed into terraform-google-modules:master Mar 15, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Bug: random_password flag is breaking when password validation policy is enabled
5 participants