-
Notifications
You must be signed in to change notification settings - Fork 212
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Bypass role grant logic for pg_database_owner
role
#316
Conversation
See issue #301. This appears to solve the issue, but may have unanticipated side-effects.
@cyrilgdn can we prioritize that, as it is a blocker for POSTGRES15 |
@cyrilgdn (and @kylejohnson, not sure if you are a new maintainer?) any idea when this would get in? Or when supporting This is a pretty major blocker if people cant upgrade their PG versions |
Hi, I had a look last Sunday week-end but I'm don't think thix fix is enough, I'll try to confirm that next week-end and to enhance the fix if needed. |
Hi @cyrilgdn. Just for curiosity, have you had a chance to take a look at this? |
Also following along on this thread. This is currently a blocker for us to stand up postgres 15 databases on AWS Aurora. Basically it means teams who need a new database must use 14.x, which just means we're going to have to deal with more upgrades in the future. |
I tested this fix with Google Cloud SQL PostgreSQL 15 and it seems to work fine. |
I'm no expert on this, but should the change introduced in this PR only apply when PostgreSQL versions >= 14? (Or 15? Although I think the role was introduced in PostgreSQL 14.) That way it won't introduce any (unlikely) side-effects on earlier versions. |
This change would only apply to databases with the I am also not sure that this is actually the ideal "fix" to the problem, it's my best attempt to work around an issue with no knowledge on what's really happening or intended here. So short answer: Yeah, that is probably a reasonable check that could be added here, but rather than add more complex logic to the fix I'm proposing, I'd like to give @cyrilgdn time/space to assess the root cause and determine if this is the right approach, or if there's a more complete solution. |
@cyrilgdn Please, we are blocked on this. We can't manage new databases or migrate to 15. |
Running into this issue as well when trying to create Aurora Postgres 15.x instances on AWS. |
Replaced by #348 |
See issue #301. This appears to solve the issue, but may have unanticipated side-effects.
This is my incredibly naive attempt at fixing the issue here. I don't understand enough of what is being done here and why to understand if this is a terrible idea, or what limitations this will introduce. I imagine that without this, if Terraform is using a role that doesn't have proper permissions to grant permissions, it will fail (but for a different reason), which may be why this code was originally in place.
I have tried this out by debugging locally with this change in place on a state impacted by the failure in #301 and it was able to apply for my state without a problem.
I would love to get any feedback on what this PR would need to be up to necessary standards to be pulled in.